Sword vs. Shield: Network Scanning and Firewall Security

This lab assignment covers network scanning techniques using Nmap and firewall configuration with pfSense. It explores the vulnerabilities discovered through the scanning process, such as open ports and potential exploitation, and demonstrates how configuring firewall rules can mitigate these risks. The exercise also evaluates the advantages and disadvantages of blocking ICMP traffic for network defense and operational efficiency.

The Critical Need for Cybersecurity in Today’s Economy

This essay examines the role of cybersecurity in today’s economy, highlighting its importance in protecting supply chains, critical infrastructure, and business continuity. It explores the readiness economy, workforce opportunities in cybersecurity, and the growing need for resilience against nation-state attacks and sophisticated cyber threats.

Traffic Tracing & Network Packet Analysis

This assignment explores traffic tracing and network packet analysis using Wireshark in a virtualized lab environment. It examines ICMP, DNS, and FTP traffic to understand packet flow, filtering techniques, response behavior, and the security risks of plaintext protocols through hands-on analysis.

Victim Precipitation in Cyber Victimization & Potential Remedies

How much does user behavior contribute to cyber losses? My paper analyzes Victim Precipitation in cyberattacks and provides proven, actionable remedies—from effective training to policy changes—to minimize your human risk factor. Full ODU analysis here!

How Linear Algebra and Probability Distributions Concepts Are Utilized in Various ML Models

This essay explains how linear algebra and probability distributions form the mathematical foundation of machine learning models. It explores how vectors, matrices, tensors, and probabilistic reasoning enable learning, prediction, and uncertainty handling in modern ML systems.

Components of a Business: What They Are & Their Relation to IT & Cybersecurity

Every component of a business—from R&D to Sales—is now digitized. This paper details how IT and cybersecurity must move from support roles to strategic partners to drive competitive advantage and control organizational risk. Download the full report!

Standing Desk Time Tracker

I built a simple Excel Standing Desk Time Tracker to create a quick, one-stop way to log standing sessions and clearly track week-to-week progress. ✅ Track up to 8 sessions/day (start/end time)✅ Auto-calculates durations + daily totals✅ Weekly summary (total hours + daily average)✅ Year-long “Master Tracking” sheet for quarterly + annual progress Excel keeps…

First Amendment Freedoms & Protections: The Cyber World and You

This paper analyzes First Amendment freedoms in the digital world, examining the roles of government institutions and private platforms in moderating misleading or harmful content. It explores legal limits on speech, platform responsibility, protest rights, and the impact of technology on democratic discourse and cybersecurity law.

Building Amazon’s Next-Generation Fulfillment Network

How did Amazon cut shipping costs & boost delivery speed? I break down the Project FC Network Initiative—the massive regionalization effort powered by network optimization, Edge Computing, and AWS cloud. See the business case for next-gen fulfillment. Read the full paper!

The CIA Triad & the AAA Framework

Dive into the essential backbone of cybersecurity. This paper breaks down the CIA Triad (Confidentiality, Integrity, Availability) and pairs it with the operational power of the AAA Framework (Authentication, Authorization, Accounting). Learn how these twin concepts form the non-negotiable foundation for securing any modern digital asset.