{"id":417,"date":"2026-01-22T16:47:22","date_gmt":"2026-01-22T16:47:22","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/?page_id=417"},"modified":"2026-02-10T01:13:16","modified_gmt":"2026-02-10T01:13:16","slug":"skills-3","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/skills-3\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">Introduction<\/h3>\n\n\n\n<p>A hardworking Individual with the ability and passion to learn as many things as possible. I have a strong foundational knowledge with both cybersecurity and computer science. I have experience in working with many coding languages like java, C++, python, and rust. I also have experience with cryptography, ethical hacking and network administration.  Below are projects and examples from some of the courses I&#8217;ve taken during my time at Old Dominion University. These courses tapped into my critical thinking with the ethical hacking assignments and projects, adaptability with the switching of coding languages, and problem-solving skills with the coding projects and figuring out how to solve tasks. <\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<ul>\n<li>CS250 &#8211; Programming with C++<\/li>\n<\/ul>\n\n\n\n<p>This course featured complex programming using the coding language C++. Below is an example of one the assignements I completed. This goal of this assignment was to get the computer to find a way to find its way to the top of a board while also avoiding obstacles on that board. The output is below Aswell.<\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div data-wp-interactive=\"\" class=\"wp-block-file alignwide\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-content\/uploads\/sites\/36181\/2026\/02\/assignment-8-4.pdf\" type=\"application\/pdf\" style=\"width:100%;height:589px\" aria-label=\"PDF embed\"><\/object><\/div>\n<\/div><\/div>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"479\" height=\"617\" src=\"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-content\/uploads\/sites\/36181\/2026\/02\/Screenshot-2026-02-09-174611-1.png\" alt=\"\" class=\"wp-image-451\" style=\"width:298px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-content\/uploads\/sites\/36181\/2026\/02\/Screenshot-2026-02-09-174611-1.png 479w, https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-content\/uploads\/sites\/36181\/2026\/02\/Screenshot-2026-02-09-174611-1-233x300.png 233w\" sizes=\"(max-width: 479px) 100vw, 479px\" \/><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<ul>\n<li>CYSE450 &#8211; Ethical Hacking and Penetration Testing <\/li>\n<\/ul>\n\n\n\n<p>This course introduces the basic terminologies used in ethical hacking and useful tools in<br>Relation to penetration testing on Kali Linux. in this course I learned to explore the vulnerabilities in<br>various systems and operate the industry-leading tools and framework to perform the<br>penetration testing on different target systems. Below is an assignment where I did active reconnaissance and vulnerability scanning. <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file alignwide\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-content\/uploads\/sites\/36181\/2026\/02\/annotated-Lab203.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:480px\" aria-label=\"PDF embed\"><\/object><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<ul>\n<li>CYSE301 &#8211; Cyber Techniques and Operation<\/li>\n<\/ul>\n\n\n\n<p>This course focuses on tools and techniques involved in real-world cyber operations. It provides a<br>broad range of cybersecurity concepts and essential hands-on training. In this course I learned the basic cybersecurity discipline, underline the model computing environment, and practice different tools and strategies to perform cyber-attacks and defense operations. Below is an example of course work I&#8217;ve done. <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-content\/uploads\/sites\/36181\/2026\/02\/annotated-Assignment205.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"PDF embed\"><\/object><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Introduction A hardworking Individual with the ability and passion to learn as many things as possible. I have a strong foundational knowledge with both cybersecurity and computer science. I have experience in working with many coding languages like java, C++,&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/skills-3\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28140,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/pages\/417"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/users\/28140"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/comments?post=417"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/pages\/417\/revisions"}],"predecessor-version":[{"id":477,"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/pages\/417\/revisions\/477"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kevonlmerritte\/wp-json\/wp\/v2\/media?parent=417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}