{"id":201,"date":"2025-08-09T15:21:57","date_gmt":"2025-08-09T15:21:57","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/my-nguyen\/?page_id=201"},"modified":"2025-08-09T21:58:47","modified_gmt":"2025-08-09T21:58:47","slug":"technical-skills","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/my-nguyen\/technical-skills\/","title":{"rendered":"Cybersecurity Operations &amp; Threat Analysis"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\"><strong>Artifact 1: Traffic Tracing and Sniffing<\/strong><\/h2>\n\n\n\n<p>This assignment shows my skill in traffic tracing and sniffing to monitor network data for suspicious activity. Using tools like Wireshark , I learned how to analyze packets and identify potential threats, strengthening my ability to detect and respond to cyber attacks.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-content\/uploads\/sites\/39255\/2025\/08\/Traffic-Tracing-and-Sniffing.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Traffic-Tracing-and-Sniffing.\"><\/object><a id=\"wp-block-file--media-fbaab68d-ceee-4dd4-bd7f-ebf0fd3a3e84\" href=\"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-content\/uploads\/sites\/39255\/2025\/08\/Traffic-Tracing-and-Sniffing.pdf\">Traffic-Tracing-and-Sniffing<\/a><a href=\"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-content\/uploads\/sites\/39255\/2025\/08\/Traffic-Tracing-and-Sniffing.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-fbaab68d-ceee-4dd4-bd7f-ebf0fd3a3e84\">Download<\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Artifact 2: Ransomware Incident Response Report<\/h2>\n\n\n\n<p>This assignment shows my ability to investigate and respond to a ransomware attack at a manufacturing company. It highlights skills in identifying threats, assessing risks, and creating strategies to protect critical systems and ensure business continuity.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-content\/uploads\/sites\/39255\/2025\/08\/Information_Assurance_Project_Report-.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Information_Assurance_Project_Report-.\"><\/object><a id=\"wp-block-file--media-b3cdd172-1f47-4c8a-9d05-ebdac7674e7a\" href=\"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-content\/uploads\/sites\/39255\/2025\/08\/Information_Assurance_Project_Report-.pdf\">Information_Assurance_Project_Report-<\/a><a href=\"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-content\/uploads\/sites\/39255\/2025\/08\/Information_Assurance_Project_Report-.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-b3cdd172-1f47-4c8a-9d05-ebdac7674e7a\">Download<\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Artifact 3: Supply Chain Attack Analysis<\/h2>\n\n\n\n<p>This paper examines a major supply chain cyberattack where malicious code was embedded in trusted software updates to breach multiple networks. It highlights my understanding of advanced attack methods and the vulnerabilities in software supply chains.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-content\/uploads\/sites\/39255\/2025\/08\/Term_Paper.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Term_Paper.\"><\/object><a id=\"wp-block-file--media-21dd8a47-6137-4725-b854-112b638ffaf2\" href=\"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-content\/uploads\/sites\/39255\/2025\/08\/Term_Paper.pdf\">Term_Paper<\/a><a href=\"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-content\/uploads\/sites\/39255\/2025\/08\/Term_Paper.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-21dd8a47-6137-4725-b854-112b638ffaf2\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Artifact 1: Traffic Tracing and Sniffing This assignment shows my skill in traffic tracing and sniffing to monitor network data for suspicious activity. Using tools like Wireshark , I learned how to analyze packets and identify potential threats, strengthening my ability to detect and respond to cyber attacks. Artifact 2: Ransomware Incident Response Report This&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/my-nguyen\/technical-skills\/\">Read More<\/a><\/div>\n","protected":false},"author":28558,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-json\/wp\/v2\/pages\/201"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-json\/wp\/v2\/users\/28558"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-json\/wp\/v2\/comments?post=201"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-json\/wp\/v2\/pages\/201\/revisions"}],"predecessor-version":[{"id":255,"href":"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-json\/wp\/v2\/pages\/201\/revisions\/255"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/my-nguyen\/wp-json\/wp\/v2\/media?parent=201"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}