{"id":218,"date":"2021-08-31T15:41:20","date_gmt":"2021-08-31T15:41:20","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2024-06-22T03:16:16","modified_gmt":"2024-06-22T03:16:16","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/msowe-001\/skills-2\/","title":{"rendered":"Skills and Artifacts"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"666\" src=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Technical-Skills_How-to-Them-Master-in-2022.jpg.optimal.jpg\" alt=\"\" class=\"wp-image-395\" style=\"width:347px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Technical-Skills_How-to-Them-Master-in-2022.jpg.optimal.jpg 1000w, https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Technical-Skills_How-to-Them-Master-in-2022.jpg.optimal-300x200.jpg 300w, https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Technical-Skills_How-to-Them-Master-in-2022.jpg.optimal-768x511.jpg 768w, https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Technical-Skills_How-to-Them-Master-in-2022.jpg.optimal-960x640.jpg 960w, https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Technical-Skills_How-to-Them-Master-in-2022.jpg.optimal-450x300.jpg 450w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/figure><\/div>\n\n<p>Throughout my studies for my bachelor&#8217;s degree at Old Dominion University, I was able to learn and apply many skills and techniques that would be beneficial to my career in cybersecurity in the future. With my major being cybersecurity, there was a variety of hard and soft skills that were taught and needed to be learned. Below I&#8217;ve attached all of my artifacts that are aligned with hard\/soft skills, while giving a brief explanation of what exactly the skill is.\u00a0<\/p>\n<h2><strong>Technical Skills<\/strong><\/h2>\n<p>Technical Skills are an essential in the cybersecurity field. With everything evolving around technology, we must be able to provide proper security with specific skills.\u00a0 Technical skills are the expertise and competence required to perform required technological task. Below I have listed a few artifacts that list important technical skills I&#8217;ve learned over the past few years at Old Dominion University!<\/p>\n<p><em><strong>FINAL PYTHON SOCKET PROGRAMMING GAME (POWERPOINT, CODE)<\/strong><\/em><\/p>\n\n<a href=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Milestone-Final-CYSE250.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Milestone-Final-CYSE250<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Final-Project-CYSE250.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Final-Project-CYSE250<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><em><strong>CYBERSECURITY<\/strong><\/em> <strong><em>NETWORK AND SECURITY HANDS-ON LABS<\/em><\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Hands-On-2-IT315.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Hands-On-2-IT315<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Hands-On-1-IT-315.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Hands-On-1-IT-315<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Hands-On-3-IT-315.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Hands-On-3-IT-315<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Hands-On-4-IT-315.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Hands-On-4-IT-315<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Hands-On-5-IT-315.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Hands-On-5-IT-315<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><strong><em>WEBSITE DESIGN (E-PORTFOLIO)<\/em><\/strong><\/p>\n\n\n\n<p>This ePortfolio is great example of my technical skill to design a website!<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"940\" height=\"788\" src=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Critical-Thinking.jpg\" alt=\"\" class=\"wp-image-398\" style=\"width:341px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Critical-Thinking.jpg 940w, https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Critical-Thinking-300x251.jpg 300w, https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Critical-Thinking-768x644.jpg 768w, https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Critical-Thinking-358x300.jpg 358w\" sizes=\"(max-width: 940px) 100vw, 940px\" \/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\"><strong>Critical Thinking Skills<\/strong><\/h2>\n\n\n\n<p>Critical thinking skills are another important skill to be successful in the cybersecurity field. Critical thinking is the ability to interpret, evaluate, and analyze information while creating a judgment or decision on if something is right or wrong. Throughout my time here at Old Dominion University, I&#8217;ve been able to recognize this skill and determine solutions to critical situations that may have been difficult prior. In the cybersecurity field, a lot of issues and problems won&#8217;t have direct steps\/solutions, so you will have to create your own decisions off the information presented.  Below I have listed a few artifacts that express important critical thinking skills I&#8217;ve presented and executed over the years.<\/p>\n\n\n\n<p><strong><em>MILITARIZED CYBERSPACE<\/em><\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Project-Paper-CyberWar.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Project-Paper-CyberWar<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/CYSE-250-Final-Research-Paper.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-250-Final-Research-Paper<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><strong><em>PEGASUS SPYWARE CONTROVERSIES<\/em><\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Term-Paper-Cyber-Fundamentals.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Term-Paper-Cyber-Fundamentals<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><strong><em>COVID-19 VACCINE<\/em><\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Final-Term-Paper-IDS300W.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Final-Term-Paper-IDS300W<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><em><strong>ENTREPRENEURIAL GROWTH OF ELON MUSK<\/strong><\/em><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Entrepreneurship-Paper-CYSE494.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Entrepreneurship-Paper-CYSE494<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><strong><em>DIGITAL FORENSICS LABS<\/em><\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Midterm-Dig-Forensics.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Midterm-Dig-Forensics<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Final-Dig-Forensics.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Final-Dig-Forensics<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><strong><em>CYBER LAW AIDE<\/em><\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Writing-Assignment-2-Final-Cyber-Law.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Writing-Assignment-2-Final-Cyber-Law<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Writing-Assignment-1-Cyber-Law.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Writing-Assignment-1-Cyber-Law<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"474\" height=\"266\" src=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/OIP-1.jpg\" alt=\"\" class=\"wp-image-399\" style=\"width:367px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/OIP-1.jpg 474w, https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/OIP-1-300x168.jpg 300w\" sizes=\"(max-width: 474px) 100vw, 474px\" \/><\/figure><\/div>\n\n\n<h2 class=\"wp-block-heading\">Project Management<\/h2>\n\n\n\n<p>Project Management is essential to businesses and organizations within the cybersecurity field. Establishing project goals and objectives, forming roles and responsibilities, and managing risks are all key skills that help be the most efficient project manager as possible. Project managers play a crucial role in&nbsp;identifying and managing risk&nbsp;throughout a project&#8217;s lifecycle. This can help ensure that cybersecurity risks are identified, assessed, and addressed in a timely and effective manner. Below I&#8217;ve attached artifacts that present my ability to establish goals\/objectives, create and understand risk management plans in the cybersecurity field, and show firsthand communication with an active entrepreneur\/project manager who gives extra insight on being successful.<\/p>\n\n\n\n<p><strong><em>ENTREPRENEURSHIP BUSINESS PROPOSAL<\/em><\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Business-Proposal-Final-CYSE494.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Business-Proposal-Final-CYSE494<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><strong><em>MITIGATION AND RISK ASSESSMENT PAPER<\/em><\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Final-Exam-CYSE495.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Final-Exam-CYSE495<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><strong><em>INTERVIEW AN ENTREPRENEUR [@CLUTCH.EXOTIC]<\/em><\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-content\/uploads\/sites\/25503\/2024\/06\/Interview-Questions-CYSE494.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Interview-Questions-CYSE494<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Throughout my studies for my bachelor&#8217;s degree at Old Dominion University, I was able to learn and apply many skills and techniques that would be beneficial to my career in cybersecurity in the future. With my major being cybersecurity, there was a variety of hard and soft skills that were taught and needed to be&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/msowe-001\/skills-2\/\">Read More<\/a><\/div>\n","protected":false},"author":21537,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"[]"},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-json\/wp\/v2\/users\/21537"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":404,"href":"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-json\/wp\/v2\/pages\/218\/revisions\/404"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/msowe-001\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}