Reflective Essay
Introduction:
Throughout my time at Old Dominion University, I developed a wide range of interdisciplinary skills that prepared me to pursue a career as a cybersecurity analyst. The program offered a mix of technical and writing-intensive courses that strengthened my skills in professional writing, ethical hacking, and network configuration. These different abilities came from disciplines such as computer science, cybersecurity, and policy analysis, each offering a distinct perspective on real-world situations.
Many courses during my time at Old Dominion University, such as Introduction to Cybersecurity (CYSE 300), helped me establish the basic principles of cybersecurity. In my Cyber techniques and operations class, I gained more hands-on experience with tools such as Metasploit, Zenmap, and others. During that same time, I was taking CYSE425W: Strategy and Policy. This class helped me communicate very complex cybersecurity ideas in an easy-to-read report. I also wrote many papers on cybersecurity policies, including the GDPR, CCPA, and HIPAA. The combination of these classes helped me develop my critical thinking skills, present my ideas clearly and concisely, and examine security issues from multiple angles. Through this interdisciplinary approach, I not only learned how to perform technical tasks but also learned to explain risks, document them, and support the findings with clear evidence. These skills directly align with what companies are looking for when hiring a cybersecurity analyst, where my technical ability and communication skills are critical.
Ethical Hacking:
One of the most important artifacts I have included was a multi-part penetration testing lab. This was in my CYSE 301 class, where I completed the three tasks using industry-standard tools. In task A, I exploited the Server Message Block (SMB) on a Windows XP machine using Metasploit, which made me identify the correct exploit module, configure the correct payload, and then establish a secure remote connection. Task B expanded my knowledge by having me exploit a Windows Server 2022 machine, which is a more hardened, up-to-date system. This required careful evaluation and verification before deploying the attack. After establishing the remote connection, I had now gained access to the Windows Server 2022 machine. Task C consisted of creating and deploying a payload against a Windows 7 machine, teaching how antivirus evasion, payload selection, and persistent mechanisms play a role in real-world scenarios. Once I had completed these tasks, I understood not only how to exploit these systems but also why patch management is so important. Strategies like system hardening and network segmentation became very apparent as to why they are so important through this assignment.
Throughout this assignment, I encountered many problems, such as misconfigured payloads, incorrect exploit settings, and systems that required much more reconnaissance than others. When solving these issues, they needed me to think critically through analysis, methodology, and troubleshooting, and to verify each step of the process. The skills I practiced included payload configuration, enumeration, scanning, and exploiting system weaknesses, which directly align with what employers are looking for when hiring a cybersecurity analyst. This assignment shows my ability to hack while using the tools safely, responsibly, and ethically.
Professional writing skills:
My professional writing skills are presented through my Meta AI case study from my cybersecurity ethics class. This paper required me to research a current cybersecurity issue and analyze it in a well-structured research paper. The case study examined a feature that made AI chat public without the user’s full knowledge. This assignment prompted me to explore the social, ethical, and security implications of making private chats public. A feature like this could impact user trust, data storage concerns, and organizational accountability. I looked into how the feature aligned with or did not align with privacy regulations, public expectations of AI, and best practices. The case study prompted me to use policy frameworks and scholarly articles to support my arguments, ultimately leading to a research paper on the potential risks and privacy concerns associated with Meta’s AI feature.
Completing this paper improved my ability to communicate intricate security and privacy topics professionally. This paper forced me to break down complex security and privacy concerns for everyday users with evidence. These skills are all critical as I pursue a role as a cyber analyst, demonstrating my ability to communicate professionally. Through drafting, revisions, and instructor feedback, I improved my formal writing, my structuring of technical analysis, and my use of a formal tone. These skills are critical in analysis roles where you need to create incident reports, risk assessments, and other documents to guide the organization toward a secure setup.
Network configuration:
My network configuration skills are best demonstrated through my project in my information technology class, where I planned and budgeted the implementation of a network for a high school. This assignment required me to plan out the placement of distribution closets. To provide proper coverage, I had to plan which closets would serve as the main distribution frame and the intermediate distribution frames. I determined cable runs and optimal closet placement, and scheduled two network drops in each classroom and office. The assignment involved real-world considerations such as the building’s 300-foot width, cable limitations, and the hardware needed to create a functional network.
Working through this assignment helped me understand how network infrastructure can affect performance, connectivity, maintenance, and security. I had to think about patch panels, cable types, how traffic would flow between floors, and switch port capacity. Challenges such as getting the right amount of cable, deciding where to place the intermediate distribution frame, and planning for future scalability required me to problem-solve and pay close attention to every little detail. I also used concepts from previous courses, such as subnetting, flowchart design, VLAN design, and hardware fundamentals, to ensure the final product was usable. This project helped me understand how networks are crafted at the foundational level. This knowledge is essential in network security and preventing attacks through hardware.
Conclusion:
Looking back at my coursework in cybersecurity and interdisciplinary studies during my time at Old Dominion University, I see the accumulation of skills from the many courses I took. The program taught me across various disciplines, which helped improve my cyber skills. The blend of other skills, such as analytical discussion, technological knowledge, and professional communication, all helped improve my overall cybersecurity abilities. Courses such as CYSE 300 and CYSE 301 helped advance my technical skills through hands-on assignments and labs. While also taking those courses, CYSE 425W helped improve my writing and communication skills. Overall, becoming an interdisciplinary thinker at Old Dominion University will help propel me toward my career goal of becoming a cybersecurity analyst.