{"id":149,"date":"2023-02-03T04:45:53","date_gmt":"2023-02-03T04:45:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=149"},"modified":"2025-06-28T16:27:16","modified_gmt":"2025-06-28T16:27:16","slug":"skills","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/kevinmckenna\/skills\/","title":{"rendered":"Skills"},"content":{"rendered":"<h2 data-start=\"199\" data-end=\"238\">\ud83d\udd10 Core Soft Skills in Cybersecurity<\/h2>\n<ul data-start=\"1332\" data-end=\"1666\">\n<li data-start=\"1557\" data-end=\"1666\">\n<h3 data-start=\"280\" data-end=\"310\">1. <strong data-start=\"287\" data-end=\"310\">Ethical Judgement<\/strong><\/h3>\n<blockquote data-start=\"311\" data-end=\"624\">\n<p data-start=\"313\" data-end=\"624\">Throughout my Navy career and cybersecurity studies, ethical judgement is always at the forefront of my mind. Through the extensive studying of various Cybersecurity incidents, as well as the handling of classified materials throughout my time in the Navy, I have developed and honed my skillset in this category.<\/p>\n<\/blockquote>\n<p data-start=\"626\" data-end=\"640\"><strong data-start=\"626\" data-end=\"640\">Artifacts:<\/strong><\/p>\n<ul data-start=\"641\" data-end=\"1048\">\n<li data-start=\"641\" data-end=\"772\">\n<p data-start=\"643\" data-end=\"772\">\ud83d\udd39 <em><a href=\"https:\/\/sites.wp.odu.edu\/kevinmckenna\/phil-355e\/case-analysis-on-csr\/\">Case Analysis on CSR<\/a>\u2013 Used ethical tools to demonstrate understanding of the ethics involved with CSR using real world historic examples.\u00a0<\/em><\/p>\n<\/li>\n<li data-start=\"773\" data-end=\"907\">\n<p data-start=\"775\" data-end=\"907\">\ud83d\udd39 <a href=\"https:\/\/sites.wp.odu.edu\/kevinmckenna\/phil-355e\/data-privacy-case-analysis\/\"><em data-start=\"778\" data-end=\"804\">Case Analysis on Data Privacy<\/em><\/a> \u2013Used ethical tools to demonstrate understanding of the ethics involved with data privacy using real world historic examples.<\/p>\n<\/li>\n<li data-start=\"908\" data-end=\"1048\">\n<p data-start=\"910\" data-end=\"1048\">\ud83d\udd39 <a href=\"https:\/\/sites.wp.odu.edu\/kevinmckenna\/phil-355e\/case-analysis-on-whistleblowing\/\"><i>Case Analysis on Whistleblowing<\/i><\/a>\u2013 Used ethical tools to demonstrate understanding of the ethics on whistleblowing utilizing real world historic examples.<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"1050\" data-end=\"1053\" \/>\n<h3 data-start=\"1055\" data-end=\"1079\">2. <strong data-start=\"1062\" data-end=\"1079\">Communication<\/strong><\/h3>\n<blockquote data-start=\"1080\" data-end=\"1389\">\n<p data-start=\"1082\" data-end=\"1389\">My experience as an Operations Specialist in the Navy taught me the importance of clear, direct communication under pressure. I\u2019ve carried this forward into cybersecurity, where translating complex technical issues into language that executives, end-users, or teammates can act on is a key strength of mine.<\/p>\n<\/blockquote>\n<p data-start=\"1391\" data-end=\"1405\"><strong data-start=\"1391\" data-end=\"1405\">Artifacts:<\/strong><\/p>\n<ul data-start=\"1406\" data-end=\"1851\">\n<li data-start=\"1406\" data-end=\"1552\">\n<p data-start=\"1408\" data-end=\"1552\">\ud83d\udd39 <a href=\"https:\/\/sites.wp.odu.edu\/kevinmckenna\/cs-462\/\"><i>IoT Data Breach Write-up<\/i><\/a> \u2013 Effectively communicated what &#8220;IoT&#8221; is, as well as demonstrated it&#8217;s weaknesses as they pertained to a Mars Hydro Data Breach.<\/p>\n<\/li>\n<li data-start=\"1553\" data-end=\"1699\">\n<p data-start=\"1555\" data-end=\"1699\">\ud83d\udd39 <a href=\"https:\/\/sites.wp.odu.edu\/kevinmckenna\/cyse-300\/\"><em data-start=\"1558\" data-end=\"1584\">Incident Report Write-Up<\/em><\/a> \u2013 Drafted a clear, concise incident write-up effectively communicating in detail about the 2017 Equifax data breach.<\/p>\n<\/li>\n<li data-start=\"1553\" data-end=\"1699\">\n<p data-start=\"1555\" data-end=\"1699\">\ud83d\udd39 <a href=\"https:\/\/sites.wp.odu.edu\/kevinmckenna\/it-cyse-200t-2\/\"><em data-start=\"1705\" data-end=\"1730\">The CIA Triad<\/em><\/a> \u2013 Skillfully demonstrated complete understanding of the CIA triad, as well as the difference between authentication and authorization.<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"1853\" data-end=\"1856\" \/>\n<h3 data-start=\"1858\" data-end=\"1884\">3. Creative Problem-Solving<\/h3>\n<blockquote data-start=\"1885\" data-end=\"2161\">\n<p data-start=\"1887\" data-end=\"2161\">Whether managing radar systems or troubleshooting a firewall rule set, I\u2019ve always approached challenges with a problem-solving mindset. In cybersecurity, I thrive in environments where I can methodically break down issues and apply creative solutions under tight deadlines.<\/p>\n<\/blockquote>\n<p data-start=\"2163\" data-end=\"2177\"><strong data-start=\"2163\" data-end=\"2177\">Artifacts:<\/strong><\/p>\n<ul data-start=\"2178\" data-end=\"2608\">\n<li data-start=\"2178\" data-end=\"2322\">\n<p data-start=\"2180\" data-end=\"2322\">\ud83d\udd39 <a href=\"https:\/\/sites.google.com\/odu.edu\/cybersensei\/home?authuser=0\"><em data-start=\"2183\" data-end=\"2217\">UX Design Thinking<\/em> <\/a>\u2013 Developed a product utilizing design thinking to demonstrate and assist users with proper cyber hygiene through gamification.<\/p>\n<\/li>\n<li data-start=\"2323\" data-end=\"2464\">\n<p data-start=\"2325\" data-end=\"2464\">\ud83d\udd39\u00a0 <a href=\"https:\/\/kmcke010.itch.io\/arcane-chaos\">Game Design<\/a>\u2013 Developed a game utilizing multiple assets across third-party applications for a well-flushed out final product.<\/p>\n<\/li>\n<li data-start=\"2465\" data-end=\"2608\">\n<p data-start=\"2467\" data-end=\"2608\">\ud83d\udd39<a href=\"https:\/\/sites.wp.odu.edu\/kevinmckenna\/cyse-250-basic-programming-and-networking\/\"> Python Socket Programming<\/a> \u2013Designed a socket programming script in Python to include both a server and a client to assist users in the knowledge of how to care for common house plants<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"1559\" data-end=\"1666\">\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\ud83d\udd10 Core Soft Skills in Cybersecurity 1. Ethical Judgement Throughout my Navy career and cybersecurity studies, ethical judgement is always at the forefront of my mind. Through the extensive studying of various Cybersecurity incidents, as well as the handling of classified materials throughout my time in the Navy, I have developed and honed my skillset&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/kevinmckenna\/skills\/\">Read More<\/a><\/div>\n","protected":false},"author":25938,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kevinmckenna\/wp-json\/wp\/v2\/pages\/149"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kevinmckenna\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kevinmckenna\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kevinmckenna\/wp-json\/wp\/v2\/users\/25938"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kevinmckenna\/wp-json\/wp\/v2\/comments?post=149"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/kevinmckenna\/wp-json\/wp\/v2\/pages\/149\/revisions"}],"predecessor-version":[{"id":478,"href":"https:\/\/sites.wp.odu.edu\/kevinmckenna\/wp-json\/wp\/v2\/pages\/149\/revisions\/478"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kevinmckenna\/wp-json\/wp\/v2\/media?parent=149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}