{"id":218,"date":"2023-08-28T02:26:38","date_gmt":"2023-08-28T02:26:38","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2025-04-23T05:38:22","modified_gmt":"2025-04-23T05:38:22","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/mohammad\/skills-2\/","title":{"rendered":"Skills"},"content":{"rendered":"<p style=\"text-align: center\" data-pm-slice=\"1 1 []\"><strong>Welcome to the Skills &amp; Artifacts section of my ePortfolio. Here, I\u2019ve highlighted three key technical skills that reflect the work I\u2019ve done through hands-on experience in IT support, device deployment, and cybersecurity awareness. Each skill is supported by real examples that show how I\u2019ve applied what I\u2019ve learned in academic and professional environments.<\/strong><\/p>\n<h3 class=\"\" data-start=\"428\" data-end=\"486\">\ud83d\udd39 Skill 1: Technical Troubleshooting &amp; System Support<\/h3>\n<p class=\"\" data-start=\"488\" data-end=\"871\"><strong data-start=\"488\" data-end=\"508\">Intro Paragraph: <\/strong><\/p>\n<p class=\"\" data-start=\"488\" data-end=\"871\">My background as a Provisioning Specialist and IT Technician helped me build strong troubleshooting skills. I\u2019ve worked directly with devices, apps, and system-level errors, learning how to fix issues quickly and reduce downtime. These artifacts show how I\u2019ve used those skills in real-world situations.<\/p>\n<p data-pm-slice=\"1 1 []\"><strong>Artifact 1: Troubleshooting Log<\/strong><br \/>\nBelow is a sample log of common tech issues I resolved on the job:<\/p>\n<ul data-spread=\"true\">\n<li><strong>Issue:<\/strong> Device not connecting to Wi-Fi<br \/>\n<strong>Action Taken:<\/strong> Reconfigured settings, removed\/re-added network, rebooted device<br \/>\n<strong>Result:<\/strong> Restored connection and logged resolution<\/li>\n<li><strong>Issue:<\/strong> App crashing on iPad used by pilot<br \/>\n<strong>Action Taken:<\/strong> Reinstalled app through MDM, verified software version<br \/>\n<strong>Result:<\/strong> App relaunched successfully after reconfiguration<\/li>\n<li><strong>Issue:<\/strong> Device freezing during initial setup<br \/>\n<strong>Action Taken:<\/strong> Reimaged device, installed system drivers, ran diagnostic tools<br \/>\n<strong>Result:<\/strong> Device worked as expected after system reinstallation<\/li>\n<\/ul>\n<p><strong>Artifact 2: System Reimaging Guide<\/strong><br \/>\nA quick guide I followed when reimaging iPads or laptops:<\/p>\n<ol start=\"1\" data-spread=\"false\">\n<li>Boot device in recovery mode<\/li>\n<li>Use the approved software image<\/li>\n<li>Install OS updates and drivers<\/li>\n<li>Test for stability before deploying<\/li>\n<\/ol>\n<p><strong>Artifact 3: Incident Response Summary<\/strong><br \/>\nDuring a system freeze issue, I documented the timeline, tools used, and how the issue was resolved step-by-step. This helped track repeat problems and speed up future responses.<\/p>\n<p>&nbsp;<\/p>\n<h3 class=\"\" data-start=\"1208\" data-end=\"1254\">\ud83d\udd39 Skill 2: Device &amp; Network Configuration<\/h3>\n<p class=\"\" data-start=\"1256\" data-end=\"1649\"><strong data-start=\"1256\" data-end=\"1276\">Intro Paragraph:<\/strong><\/p>\n<p data-pm-slice=\"1 1 []\">A big part of my experience includes deploying devices at scale using MDM tools, configuring devices for secure use, and helping users get connected to the right networks. These artifacts show how I managed large device rollouts and ensured everything was set up properly.<\/p>\n<p data-pm-slice=\"1 3 []\"><strong>Artifact 1: MDM Deployment Plan<\/strong><br \/>\nOne of my biggest projects involved provisioning over 2,500 iPads for Spirit Airlines. I used MDM to:<\/p>\n<ul data-spread=\"false\">\n<li>Install essential apps (navigation, communication)<\/li>\n<li>Apply security policies<\/li>\n<li>Configure Wi-Fi and restrictions<\/li>\n<li>Track and label all devices<\/li>\n<\/ul>\n<p><strong>Artifact 2: Device Configuration Checklist<\/strong><br \/>\nMy setup checklist ensured every device was ready before leaving the desk:<\/p>\n<ul data-spread=\"false\">\n<li>Device ID logged<\/li>\n<li>OS updated<\/li>\n<li>Apps installed<\/li>\n<li>MDM enrolled<\/li>\n<li>Security settings enabled<\/li>\n<\/ul>\n<p><strong>Artifact 3: Wi-Fi &amp; Network Settings Sheet<\/strong><br \/>\nTo make sure users could get online easily, I created a document with:<\/p>\n<ul data-spread=\"false\">\n<li>Step-by-step Wi-Fi setup for iPads and laptops<\/li>\n<li>IP settings and DNS instructions<\/li>\n<li>Common troubleshooting tips<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3 class=\"\" data-start=\"1989\" data-end=\"2047\">\ud83d\udd39 Skill 3: Cybersecurity Awareness &amp; System Integrity<\/h3>\n<p class=\"\" data-start=\"2049\" data-end=\"2399\"><strong data-start=\"2049\" data-end=\"2069\">Intro Paragraph:<\/strong><\/p>\n<p class=\"\" data-start=\"2049\" data-end=\"2399\">Working in IT also taught me how important system security is. I kept systems safe by installing updates, monitoring viruses, and managing access. These artifacts show my focus on protecting devices and data.<\/p>\n<p data-pm-slice=\"1 3 []\"><strong>Artifact 1: Virus Monitoring Report<\/strong><br \/>\nWhile managing devices in a production environment, I regularly scanned for threats using antivirus tools. Each scan was logged for recordkeeping and review. Here is a simplified example of what I tracked:<\/p>\n<ul data-spread=\"true\">\n<li><strong>Date:<\/strong> March 15, 2025<br \/>\n<strong>Device:<\/strong> iPad<br \/>\n<strong>Threat Detected:<\/strong> None<br \/>\n<strong>Action Taken:<\/strong> Routine scan only<br \/>\n<strong>Follow-Up:<\/strong> Noted for monthly scan history<\/li>\n<li><strong>Date:<\/strong> April 3, 2025<br \/>\n<strong>Device:<\/strong> Windows Laptop<br \/>\n<strong>Threat Detected:<\/strong> PUA: Win32\/InstallCore<br \/>\n<strong>Action Taken:<\/strong> Quarantined and removed<br \/>\n<strong>Follow-Up:<\/strong> User notified; device rescanned 24 hours later<\/li>\n<\/ul>\n<p><strong>Artifact 2: System Update &amp; Patch Record<\/strong><br \/>\nKeeping software up to date was a key part of reducing risk. I used a patch tracking spreadsheet to stay organized. Here\u2019s a simplified entry:<\/p>\n<ul data-spread=\"true\">\n<li><strong>Device:<\/strong> Windows Laptop<br \/>\n<strong>Before:<\/strong> Windows 10 Pro 21H1<br \/>\n<strong>After:<\/strong> Windows 10 Pro 22H2<br \/>\n<strong>Date:<\/strong> March 28, 2025<br \/>\n<strong>Notes:<\/strong> Restart required; system stable after patch<\/li>\n<li><strong>Device:<\/strong> iPhone<br \/>\n<strong>Before:<\/strong> iOS 15.3<br \/>\n<strong>After:<\/strong> iOS 16.1.1<br \/>\n<strong>Date:<\/strong> April 2, 2025<br \/>\n<strong>Notes:<\/strong> Wi-Fi settings reconfigured post-update<\/li>\n<\/ul>\n<p><strong>Artifact 3: Access Control Summary<\/strong><br \/>\nI supported our security efforts by helping monitor user access and manage credentials. Here\u2019s an example of a few access tasks I completed:<\/p>\n<ul data-spread=\"false\">\n<li>Removed inactive accounts from shared test devices<\/li>\n<li>Helped review failed login attempts on key admin accounts<\/li>\n<li>Reset passwords and enforced two-factor authentication<\/li>\n<li>Flagged a suspicious login from outside the U.S. and reported it to our security lead<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Welcome to the Skills &amp; Artifacts section of my ePortfolio. Here, I\u2019ve highlighted three key technical skills that reflect the work I\u2019ve done through hands-on experience in IT support, device deployment, and cybersecurity awareness. Each skill is supported by real examples that show how I\u2019ve applied what I\u2019ve learned in academic and professional environments. \ud83d\udd39&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/mohammad\/skills-2\/\">Read More<\/a><\/div>\n","protected":false},"author":27238,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mohammad\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mohammad\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mohammad\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mohammad\/wp-json\/wp\/v2\/users\/27238"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mohammad\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/mohammad\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":580,"href":"https:\/\/sites.wp.odu.edu\/mohammad\/wp-json\/wp\/v2\/pages\/218\/revisions\/580"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mohammad\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}