{"id":237,"date":"2026-01-25T17:16:06","date_gmt":"2026-01-25T17:16:06","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/?page_id=237"},"modified":"2026-03-09T01:24:45","modified_gmt":"2026-03-09T01:24:45","slug":"skills","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/skills\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<p>Cybersecurity Fundamentals: I have developed a strong foundation in cybersecurity principles, that organizations use to protect systems and data.<\/p>\n\n\n\n<p>Key Concepts: CIA Triad, Risk Management, Authentication and Access Control, Incident Response, Security Policies, Threat and Vulnerabilities <\/p>\n\n\n\n<p>Networking and Networking Security: Networks are a critical part of cybersecurity, as all attacks occur across a network. My program has helped me understand how networks operate and how to properly secure them.<\/p>\n\n\n\n<p>Networking Skills: TCP\/IP networking basics, subnetting and ip addressing, network protocols, firewalls and network segmentation, network monitoring, secure network design principles, intrusion detection,  <\/p>\n\n\n\n<p>Operating Systems: I have gained experience working with different operating systems in cybersecurity environments<\/p>\n\n\n\n<p>Operating System Skills: Linux system administration basics, user management and file permissions, system configuration, windows security setting, user access management, operating system vulnerabilities <\/p>\n\n\n\n<p> Programming and Scripting: I have basic programming and scripting knowledge<\/p>\n\n\n\n<p>Languages and technologies: Basic python scripting, basic power shell scripting, basic command line scripting<\/p>\n\n\n\n<p> Soft skills: Problem Solving, Critical thinking, attention to detail, team work, continuous learning<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Fundamentals: I have developed a strong foundation in cybersecurity principles, that organizations use to protect systems and data. Key Concepts: CIA Triad, Risk Management, Authentication and Access Control, Incident Response, Security Policies, Threat and Vulnerabilities Networking and Networking Security: Networks are a critical part of cybersecurity, as all attacks occur across a network. My&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/skills\/\">Read More<\/a><\/div>\n","protected":false},"author":27462,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/wp-json\/wp\/v2\/pages\/237"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/wp-json\/wp\/v2\/users\/27462"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/wp-json\/wp\/v2\/comments?post=237"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/wp-json\/wp\/v2\/pages\/237\/revisions"}],"predecessor-version":[{"id":274,"href":"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/wp-json\/wp\/v2\/pages\/237\/revisions\/274"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/wp-json\/wp\/v2\/media?parent=237"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}