{"id":218,"date":"2023-01-07T19:49:21","date_gmt":"2023-01-07T19:49:21","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2025-12-05T20:02:39","modified_gmt":"2025-12-05T20:02:39","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/mortonjosh\/skills-2\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Leadership Qualities<\/h1>\n\n\n\n<p id=\"block-dbdff9fd-51a9-4e66-82da-868c26719a3d\">I demonstrate leadership by promoting collaboration, guiding team efforts, and maintaining a calm, solutions-focused mindset during complex tasks. My experience coordinating professional teams and leading groups has strengthened my ability to communicate clearly, delegate effectively, and motivate others toward shared goals skills that are especially valuable in fast-paced cybersecurity environments.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/11\/How-Am-I-a-Leader_-Joshua-Morton-1-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of How-Am-I-a-Leader_-Joshua-Morton-1-1.\"><\/object><a id=\"wp-block-file--media-ed71612f-06c9-45ed-aa6f-5f4832ae1625\" href=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/11\/How-Am-I-a-Leader_-Joshua-Morton-1-1.pdf\">How-Am-I-a-Leader_-Joshua-Morton-1-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/11\/How-Am-I-a-Leader_-Joshua-Morton-1-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-ed71612f-06c9-45ed-aa6f-5f4832ae1625\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/11\/My-Self-Assessment-Joshua-Morton-2-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of My-Self-Assessment-Joshua-Morton-2-1.\"><\/object><a id=\"wp-block-file--media-3eb09e8b-c612-4ca6-b5ce-12bba8b2434b\" href=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/11\/My-Self-Assessment-Joshua-Morton-2-1.pdf\">My-Self-Assessment-Joshua-Morton-2-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/11\/My-Self-Assessment-Joshua-Morton-2-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-3eb09e8b-c612-4ca6-b5ce-12bba8b2434b\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/Photo-album-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Photo-album-1.\"><\/object><a id=\"wp-block-file--media-13360d4d-38ae-484a-b27b-2f1362ee6c8b\" href=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/Photo-album-1.pdf\">Photo-album-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/Photo-album-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-13360d4d-38ae-484a-b27b-2f1362ee6c8b\">Download<\/a><\/div>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"block-1afb561a-9600-418a-84b3-cc68b5600a02\">Technical Skills: Python, Linux, Windows Proficiency<\/h3>\n\n\n\n<p id=\"block-60166d71-146b-4f26-a51e-2d2673bd93aa\">Through my cybersecurity coursework and hands-on experience, I have developed a strong technical foundation in system administration, network security, and threat analysis. I am comfortable working with security tools, working through many operating systems and data and ethical hacking. I am also comfortable working on and tinkering with computer hardware. <\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"Python Adventure Project\" width=\"660\" height=\"371\" src=\"https:\/\/www.youtube.com\/embed\/oap-CKi9e3k?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><figcaption class=\"wp-element-caption\">A python project I completed for CYSE 250 &#8211; Basic Cybersecurity Programming and Networking<\/figcaption><\/figure>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/CYSE-301-Ethical-Hacking-Lab-Joshua-Morton-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CYSE-301-Ethical-Hacking-Lab-Joshua-Morton-1.\"><\/object><a id=\"wp-block-file--media-7aded956-1c5c-4518-9c55-1e9950bdef15\" href=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/CYSE-301-Ethical-Hacking-Lab-Joshua-Morton-1.pdf\">CYSE-301-Ethical-Hacking-Lab-Joshua-Morton-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/CYSE-301-Ethical-Hacking-Lab-Joshua-Morton-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-7aded956-1c5c-4518-9c55-1e9950bdef15\">Download<\/a><\/div>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"797\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/IMG_3419-2-797x1024.jpg\" alt=\"\" class=\"wp-image-405\" style=\"width:479px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/IMG_3419-2-797x1024.jpg 797w, https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/IMG_3419-2-233x300.jpg 233w, https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/IMG_3419-2-768x987.jpg 768w, https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/IMG_3419-2.jpg 828w\" sizes=\"(max-width: 797px) 100vw, 797px\" \/><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"806\" height=\"1024\" src=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/IMG_3420-1-806x1024.jpg\" alt=\"\" class=\"wp-image-406\" style=\"width:470px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/IMG_3420-1-806x1024.jpg 806w, https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/IMG_3420-1-236x300.jpg 236w, https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/IMG_3420-1-768x976.jpg 768w, https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/IMG_3420-1.jpg 828w\" sizes=\"(max-width: 806px) 100vw, 806px\" \/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"block-07105d24-80d3-4ea8-8e40-c7e09642e5db\">Writing Ability<\/h3>\n\n\n\n<p id=\"block-e432480a-8b03-4f63-968f-834a6186b501\">Effective communication is essential in cybersecurity, and I strive to write clearly, concisely, and professionally. From documentation and incident reports to policy summaries and research writing, I focus on translating technical information into well-structured, understandable formats for both technical and non-technical audiences as well as writing creatively on my own.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/11\/Navigating-the-Dangerous-Waters-of-Phishing-Attacks-within-Microsoft-Programs-Joshua-Morton-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Navigating-the-Dangerous-Waters-of-Phishing-Attacks-within-Microsoft-Programs-Joshua-Morton-1.\"><\/object><a id=\"wp-block-file--media-a22a5209-2ca1-4d91-9d2a-12ecd7cec3c4\" href=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/11\/Navigating-the-Dangerous-Waters-of-Phishing-Attacks-within-Microsoft-Programs-Joshua-Morton-1.pdf\">Navigating-the-Dangerous-Waters-of-Phishing-Attacks-within-Microsoft-Programs-Joshua-Morton-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/11\/Navigating-the-Dangerous-Waters-of-Phishing-Attacks-within-Microsoft-Programs-Joshua-Morton-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-a22a5209-2ca1-4d91-9d2a-12ecd7cec3c4\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/Securing-Tomorrow_-Navigating-the-Security-Challenges-of-Emerging-and-Future-Technologies-Joshua-Morton.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Securing-Tomorrow_-Navigating-the-Security-Challenges-of-Emerging-and-Future-Technologies-Joshua-Morton.\"><\/object><a id=\"wp-block-file--media-bafd999e-06fc-4ac4-9bc1-1c71f9acd68c\" href=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/Securing-Tomorrow_-Navigating-the-Security-Challenges-of-Emerging-and-Future-Technologies-Joshua-Morton.pdf\">Securing-Tomorrow_-Navigating-the-Security-Challenges-of-Emerging-and-Future-Technologies-Joshua-Morton<\/a><a href=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/Securing-Tomorrow_-Navigating-the-Security-Challenges-of-Emerging-and-Future-Technologies-Joshua-Morton.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-bafd999e-06fc-4ac4-9bc1-1c71f9acd68c\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/The-Morality-of-Violence-from-the-Buddhist-Perspective-Joshua-Morton.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of The-Morality-of-Violence-from-the-Buddhist-Perspective-Joshua-Morton.\"><\/object><a id=\"wp-block-file--media-5a793b95-cc30-43b2-901a-52d2fcf1d6fc\" href=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/The-Morality-of-Violence-from-the-Buddhist-Perspective-Joshua-Morton.pdf\">The-Morality-of-Violence-from-the-Buddhist-Perspective-Joshua-Morton<\/a><a href=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/The-Morality-of-Violence-from-the-Buddhist-Perspective-Joshua-Morton.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-5a793b95-cc30-43b2-901a-52d2fcf1d6fc\">Download<\/a><\/div>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"518\" height=\"800\" src=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/IMG_3418-1.jpg\" alt=\"\" class=\"wp-image-408\" srcset=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/IMG_3418-1.jpg 518w, https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-content\/uploads\/sites\/31833\/2025\/12\/IMG_3418-1-194x300.jpg 194w\" sizes=\"(max-width: 518px) 100vw, 518px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Leadership Qualities I demonstrate leadership by promoting collaboration, guiding team efforts, and maintaining a calm, solutions-focused mindset during complex tasks. My experience coordinating professional teams and leading groups has strengthened my ability to communicate clearly, delegate effectively, and motivate others toward shared goals skills that are especially valuable in fast-paced cybersecurity environments. Technical Skills: Python, &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/mortonjosh\/skills-2\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Skills<\/span><\/a><\/p>\n","protected":false},"author":25751,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-json\/wp\/v2\/users\/25751"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":409,"href":"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-json\/wp\/v2\/pages\/218\/revisions\/409"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mortonjosh\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}