{"id":218,"date":"2024-02-10T19:23:43","date_gmt":"2024-02-10T19:23:43","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2026-03-07T18:38:43","modified_gmt":"2026-03-07T18:38:43","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/nbrad014\/skills-2\/","title":{"rendered":"Skills"},"content":{"rendered":"<h2 data-section-id=\"pwpgvz\" data-start=\"329\" data-end=\"353\">Essential Work Habits<\/h2>\n<p data-start=\"355\" data-end=\"700\">During my coursework and internship experience, I have developed several professional habits that are essential for working in cybersecurity and technology environments. My academic projects and internship have required strong attention to detail, analytical thinking, and the ability to approach technical challenges from multiple perspectives.<\/p>\n<p data-start=\"702\" data-end=\"1165\">One of my strongest work habits is the ability to <strong data-start=\"752\" data-end=\"809\">work methodically and with strong attention to detail<\/strong>. In cybersecurity labs and network security exercises, small configuration mistakes can prevent systems from functioning properly or create vulnerabilities. Through assignments involving firewall configuration, packet analysis, and network monitoring, I have learned the importance of carefully verifying configurations and analyzing results step-by-step.<\/p>\n<p data-start=\"1167\" data-end=\"1536\">I also demonstrate an <strong data-start=\"1189\" data-end=\"1271\">eagerness to explore technical questions and examine them from multiple angles<\/strong>. During my internship, I researched how large language models operate and how they can be applied to detecting phishing emails. This required reviewing technical documentation, studying machine learning concepts, and evaluating different implementation strategies.<\/p>\n<p data-start=\"1538\" data-end=\"1926\">Another important habit I have developed is <strong data-start=\"1582\" data-end=\"1644\">adaptability and enthusiasm when learning new technologies<\/strong>. Cybersecurity and artificial intelligence evolve rapidly, and many of my projects required learning tools or concepts that were unfamiliar at first. Through hands-on experimentation and continued research, I was able to adapt and develop a stronger understanding of these systems.<\/p>\n<p data-start=\"1928\" data-end=\"2269\">My coursework has also strengthened my <strong data-start=\"1967\" data-end=\"2003\">analytical and diagnostic skills<\/strong>. For example, in network analysis labs using Wireshark, I examined packet captures to identify sensitive information transmitted in plaintext and diagnose security weaknesses. These exercises required careful interpretation of network traffic and protocol behavior.<\/p>\n<p data-start=\"2271\" data-end=\"2613\">I have also demonstrated <strong data-start=\"2296\" data-end=\"2328\">innovation and collaboration<\/strong> through academic projects and discussions with instructors and colleagues. My internship project involving the development of an AI-based phishing email detector required creative problem solving and collaboration with leadership to determine realistic goals and technical approaches.<\/p>\n<p data-start=\"2615\" data-end=\"2960\">Finally, I maintain <strong data-start=\"2635\" data-end=\"2704\">awareness of cybersecurity vulnerabilities and industry practices<\/strong> by regularly reviewing security topics covered in coursework, researching current cyber threats, and studying how attackers exploit systems. This ongoing learning helps ensure I stay informed about modern security standards, practices, and emerging risks.<\/p>\n<p data-start=\"2962\" data-end=\"2983\"><strong data-start=\"2962\" data-end=\"2983\">Example Artifacts<\/strong><\/p>\n<ul data-start=\"2985\" data-end=\"3254\">\n<li data-section-id=\"10e7rkq\" data-start=\"2985\" data-end=\"3045\">\n<p data-start=\"2987\" data-end=\"3045\">Internship research notes on AI phishing email detection<\/p>\n<\/li>\n<li data-section-id=\"10nd56l\" data-start=\"3046\" data-end=\"3129\">\n<p data-start=\"3048\" data-end=\"3129\">Cybersecurity lab reports involving network scanning and firewall configuration<\/p>\n<\/li>\n<li data-section-id=\"p30gor\" data-start=\"3130\" data-end=\"3175\">\n<p data-start=\"3132\" data-end=\"3175\">Packet analysis exercises using Wireshark<\/p>\n<\/li>\n<li data-section-id=\"jls2vs\" data-start=\"3176\" data-end=\"3254\">\n<p data-start=\"3178\" data-end=\"3254\">Coursework assignments analyzing cybersecurity threats and vulnerabilities<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"3256\" data-end=\"3259\" \/>\n<h1 data-section-id=\"lj1356\" data-start=\"3261\" data-end=\"3274\">Soft Skills<\/h1>\n<p data-start=\"3276\" data-end=\"3602\">In addition to technical skills, strong communication and interpersonal abilities are essential for working in cybersecurity and technology roles. Through coursework, presentations, and my internship experience, I have developed the ability to clearly communicate technical information and collaborate with others effectively.<\/p>\n<p data-start=\"3604\" data-end=\"3939\">One of my strongest soft skills is the <strong data-start=\"3643\" data-end=\"3744\">ability to clearly articulate complex technical concepts in both written and verbal communication<\/strong>. Many of my assignments required explaining cybersecurity topics in written reports, such as research papers on AI-driven cyber threats and reflection essays describing my internship experience.<\/p>\n<p data-start=\"3941\" data-end=\"4201\">I have also developed <strong data-start=\"3963\" data-end=\"4004\">presentation and communication skills<\/strong> through academic presentations and written reports. These experiences required translating technical information into language that is understandable to both technical and non-technical audiences.<\/p>\n<p data-start=\"4203\" data-end=\"4539\">Another important skill I have developed is <strong data-start=\"4247\" data-end=\"4267\">active listening<\/strong>, particularly when discussing technical challenges with instructors or internship supervisors. Understanding requirements and feedback is critical in cybersecurity projects where small misunderstandings can lead to incorrect system configurations or incomplete solutions.<\/p>\n<p data-start=\"4541\" data-end=\"4717\">These soft skills help ensure that technical solutions can be effectively communicated to managers, colleagues, and stakeholders who may not have the same technical background.<\/p>\n<p data-start=\"4719\" data-end=\"4740\"><strong data-start=\"4719\" data-end=\"4740\">Example Artifacts<\/strong><\/p>\n<ul data-start=\"4742\" data-end=\"4941\">\n<li data-section-id=\"zzaoyx\" data-start=\"4742\" data-end=\"4795\">\n<p data-start=\"4744\" data-end=\"4795\">Presentation slides from cybersecurity coursework<\/p>\n<\/li>\n<li data-section-id=\"u0l8ix\" data-start=\"4796\" data-end=\"4828\">\n<p data-start=\"4798\" data-end=\"4828\">Internship reflection essays<\/p>\n<\/li>\n<li data-section-id=\"62r8la\" data-start=\"4829\" data-end=\"4872\">\n<p data-start=\"4831\" data-end=\"4872\">Research papers on cybersecurity topics<\/p>\n<\/li>\n<li data-section-id=\"15ue784\" data-start=\"4873\" data-end=\"4941\">\n<p data-start=\"4875\" data-end=\"4941\">Recorded or documented presentations explaining technical topics<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"4943\" data-end=\"4946\" \/>\n<h1 data-section-id=\"995qub\" data-start=\"4948\" data-end=\"4976\">Solid Technical Foundation<\/h1>\n<p data-start=\"4978\" data-end=\"5244\">My academic program has provided a strong foundation in core cybersecurity and information technology concepts. Through coursework and hands-on labs, I have gained experience with operating systems, networking technologies, programming concepts, and system security.<\/p>\n<p data-start=\"5246\" data-end=\"5534\">I have developed an understanding of <strong data-start=\"5283\" data-end=\"5357\">operating system architecture, administration, and networking concepts<\/strong> through coursework and laboratory exercises. These labs involved configuring virtual machines, analyzing network communications, and securing systems against potential threats.<\/p>\n<p data-start=\"5536\" data-end=\"5803\">My coursework has also introduced me to <strong data-start=\"5576\" data-end=\"5625\">programming and software development concepts<\/strong>, including writing and analyzing code. These skills support cybersecurity tasks such as automation, vulnerability analysis, and understanding how software vulnerabilities occur.<\/p>\n<p data-start=\"5805\" data-end=\"6096\">I also have experience working with <strong data-start=\"5841\" data-end=\"5886\">network security tools and infrastructure<\/strong>, including firewalls, routers, and packet analysis tools. Labs involving firewall configuration and network traffic monitoring helped me understand how organizations control and monitor network communications.<\/p>\n<p data-start=\"6098\" data-end=\"6321\">Additionally, I have practiced <strong data-start=\"6129\" data-end=\"6179\">evaluating and designing network architectures<\/strong> in coursework projects, where I analyzed how systems communicate and how security controls should be implemented within network environments.<\/p>\n<p data-start=\"6323\" data-end=\"6456\">These technical skills form the foundation for more advanced cybersecurity analysis, threat detection, and system defense strategies.<\/p>\n<p data-start=\"6458\" data-end=\"6479\"><strong data-start=\"6458\" data-end=\"6479\">Example Artifacts<\/strong><\/p>\n<ul data-start=\"6481\" data-end=\"6665\">\n<li data-section-id=\"j2qzhb\" data-start=\"6481\" data-end=\"6533\">\n<p data-start=\"6483\" data-end=\"6533\">Firewall configuration lab screenshots (pfSense)<\/p>\n<\/li>\n<li data-section-id=\"fui6km\" data-start=\"6534\" data-end=\"6587\">\n<p data-start=\"6536\" data-end=\"6587\">Network scanning exercises using Kali Linux tools<\/p>\n<\/li>\n<li data-section-id=\"fulcxd\" data-start=\"6588\" data-end=\"6615\">\n<p data-start=\"6590\" data-end=\"6615\">Programming assignments<\/p>\n<\/li>\n<li data-section-id=\"1h7qegf\" data-start=\"6616\" data-end=\"6665\">\n<p data-start=\"6618\" data-end=\"6665\">Network architecture diagrams from coursework<\/p>\n<\/li>\n<\/ul>\n<hr data-start=\"6667\" data-end=\"6670\" \/>\n<h1 data-section-id=\"18z729m\" data-start=\"6672\" data-end=\"6712\">Detailed Knowledge of Key Technologies<\/h1>\n<p data-start=\"6714\" data-end=\"6878\">Through both coursework and independent study, I have gained familiarity with a range of technologies used in cybersecurity and information technology environments.<\/p>\n<p data-start=\"6880\" data-end=\"7134\">I have worked with <strong data-start=\"6899\" data-end=\"6926\">Linux operating systems<\/strong> in lab environments using tools commonly used for penetration testing and network analysis. This experience includes using command-line utilities, configuring networking tools, and analyzing system behavior.<\/p>\n<p data-start=\"7136\" data-end=\"7350\">I also have experience with <strong data-start=\"7164\" data-end=\"7190\">Microsoft technologies<\/strong>, including Windows Server environments used in cybersecurity labs. These environments helped me understand system administration concepts and network services.<\/p>\n<p data-start=\"7352\" data-end=\"7521\">My coursework has introduced me to <strong data-start=\"7387\" data-end=\"7439\">network implementation and security technologies<\/strong>, including firewalls, intrusion detection concepts, and network monitoring tools.<\/p>\n<p data-start=\"7523\" data-end=\"7733\">I have also explored <strong data-start=\"7544\" data-end=\"7586\">web technologies and database concepts<\/strong> through coursework and research projects, helping me understand how modern web applications function and where security vulnerabilities may occur.<\/p>\n<p data-start=\"7735\" data-end=\"7920\">Additionally, my research into phishing detection and cybersecurity threats has provided insight into <strong data-start=\"7837\" data-end=\"7870\">social engineering techniques<\/strong>, which are a major factor in modern cyberattacks.<\/p>\n<p data-start=\"7922\" data-end=\"8069\">Together, these experiences have helped me build a broad understanding of the technologies that cybersecurity professionals must secure and manage.<\/p>\n<p data-start=\"8071\" data-end=\"8092\"><strong data-start=\"8071\" data-end=\"8092\">Example Artifacts<\/strong><\/p>\n<ul data-start=\"8094\" data-end=\"8271\">\n<li data-section-id=\"1039d85\" data-start=\"8094\" data-end=\"8135\">\n<p data-start=\"8096\" data-end=\"8135\">Linux command line exercises and labs<\/p>\n<\/li>\n<li data-section-id=\"l9ch4\" data-start=\"8136\" data-end=\"8182\">\n<p data-start=\"8138\" data-end=\"8182\">Windows Server security configuration labs<\/p>\n<\/li>\n<li data-section-id=\"1bpei0i\" data-start=\"8183\" data-end=\"8215\">\n<p data-start=\"8185\" data-end=\"8215\">Network security lab reports<\/p>\n<\/li>\n<li data-section-id=\"1b54n7s\" data-start=\"8216\" data-end=\"8271\">\n<p data-start=\"8218\" data-end=\"8271\">Research on phishing attacks and social engineering<\/p>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Essential Work Habits During my coursework and internship experience, I have developed several professional habits that are essential for working in cybersecurity and technology environments. My academic projects and internship have required strong attention to detail, analytical thinking, and the ability to approach technical challenges from multiple perspectives. One of my strongest work habits is&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nbrad014\/skills-2\/\">Read More<\/a><\/div>\n","protected":false},"author":28652,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nbrad014\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nbrad014\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nbrad014\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nbrad014\/wp-json\/wp\/v2\/users\/28652"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nbrad014\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/nbrad014\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":324,"href":"https:\/\/sites.wp.odu.edu\/nbrad014\/wp-json\/wp\/v2\/pages\/218\/revisions\/324"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nbrad014\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}