Skills

Essential Work/Soft Skills

Detail Oriented

Being detail-oriented is necessary to avoid making careless mistakes that can impact company performance. During my academic career, I almost always followed a checklist to ensure I satisfied the requirements of any project or deliverable given to me. This ensured that everything was taken care of and that I never overlooked any small task that may impact the project or company performance.

Artifacts

  • MSIM 470 Lab 1: Reconnaissance
  • Time of Check to Time of Use
  • Network Penetration Test Analysis and Results – project

While I mentioned one soft skill, this project itself is the accumulation of all the skills aforementioned throughout the skills page. It is a lengthy report that compiles the work I have accomplished using Linux systems, understanding cybersecurity topics, and making a detailed report of my findings into a deliverable.

  • IDS 300W final essay
  • IRP process

Technical skills

Able to use Linux-based systems and Metasploit

The cybersecurity curriculum offers different operating systems, such as Python, Windows, and Linux. I prefer to choose Kali-based systems due to their vast array of tools for security testing and my prior experience navigating the environment. Below are the attachments showing examples of utilizing Kali-based systems for pen testing; most of the assignments showcased are labs, as they are equivalents of applied learning. However, the homework attachments are a prelude to lab-based assignments.

Artifacts

  • Lab 2: Set UID Attacks

  • Prelude to UID Attack Lab

  • Lab 3: Buffer Overflow


Detailed knowledge of key technologies

Understanding key concepts of cybersecurity

Key concepts are the main foundations of cybersecurity and must be thoroughly understood to protect assets from different attack vectors. Listed below, I continue to strive for a detail-orientated approach to my assignments whilst learning through the labs and assignments that help me reinforce what I’ve learned in my classes.

Artifacts

  • Assignment #1 Explore CCIA virtual environment and basic Linux commands
  • Assignment #2 Getting Started with Wireshark/Traffic Tracing and Sniffing

  • Assignment # 4 Ethical hacking