Essential Work/Soft Skills
Detail Oriented
Being detail-oriented is necessary to avoid making careless mistakes that can impact company performance. During my academic career, I almost always followed a checklist to ensure I satisfied the requirements of any project or deliverable given to me. This ensured that everything was taken care of and that I never overlooked any small task that may impact the project or company performance.
Artifacts
- MSIM 470 Lab 1: Reconnaissance
- Time of Check to Time of Use
- Network Penetration Test Analysis and Results – project
While I mentioned one soft skill, this project itself is the accumulation of all the skills aforementioned throughout the skills page. It is a lengthy report that compiles the work I have accomplished using Linux systems, understanding cybersecurity topics, and making a detailed report of my findings into a deliverable.
- IDS 300W final essay
- IRP process
Technical skills
Able to use Linux-based systems and Metasploit
The cybersecurity curriculum offers different operating systems, such as Python, Windows, and Linux. I prefer to choose Kali-based systems due to their vast array of tools for security testing and my prior experience navigating the environment. Below are the attachments showing examples of utilizing Kali-based systems for pen testing; most of the assignments showcased are labs, as they are equivalents of applied learning. However, the homework attachments are a prelude to lab-based assignments.
Artifacts
Lab 2: Set UID Attacks
Prelude to UID Attack Lab
Lab 3: Buffer Overflow
Detailed knowledge of key technologies
Understanding key concepts of cybersecurity
Key concepts are the main foundations of cybersecurity and must be thoroughly understood to protect assets from different attack vectors. Listed below, I continue to strive for a detail-orientated approach to my assignments whilst learning through the labs and assignments that help me reinforce what I’ve learned in my classes.
Artifacts
- Assignment #1 Explore CCIA virtual environment and basic Linux commands
Assignment #2 Getting Started with Wireshark/Traffic Tracing and Sniffing
Assignment # 4 Ethical hacking