{"id":218,"date":"2023-09-21T22:41:31","date_gmt":"2023-09-21T22:41:31","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2025-04-26T19:18:46","modified_gmt":"2025-04-26T19:18:46","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/neriahalcantara\/skills-2\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<h1 class=\"wp-block-heading has-text-align-center\"><strong data-cy=\"bold\">Essential Work\/Soft Skills<\/strong><\/h1>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Detail Oriented<\/h2>\n\n\n\n<p>Being detail-oriented is necessary to avoid making careless mistakes that can impact company performance. During my academic career, I almost always followed a checklist to ensure I satisfied the requirements of any project or deliverable given to me. This ensured that everything was taken care of and that I never overlooked any small task that may impact the project or company performance.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Artifacts<\/h2>\n\n\n\n<ul>\n<li><em data-cy=\"italic\">MSIM 470 Lab 1: Reconnaissance<\/em><\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-content\/uploads\/sites\/34299\/2025\/04\/MSIM-470-Lab-1-NA.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of MSIM-470-Lab-1-NA.\"><\/object><a id=\"wp-block-file--media-319bf072-07a2-4d19-a22f-78e03e8748d0\" href=\"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-content\/uploads\/sites\/34299\/2025\/04\/MSIM-470-Lab-1-NA.pdf\">MSIM-470-Lab-1-NA<\/a><\/div>\n\n\n\n<ul>\n<li><em data-cy=\"italic\">Time of Check to Time of Use<\/em><\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-content\/uploads\/sites\/34299\/2025\/04\/MSIM470-HW4-NA.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of MSIM470-HW4-NA.\"><\/object><a id=\"wp-block-file--media-f6d6025d-53b3-420a-96f9-6070cb8f1444\" href=\"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-content\/uploads\/sites\/34299\/2025\/04\/MSIM470-HW4-NA.pdf\">MSIM470-HW4-NA<\/a><\/div>\n\n\n\n<ul>\n<li><em data-cy=\"italic\">Network Penetration Test Analysis and Results &#8211; project <\/em><\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-content\/uploads\/sites\/34299\/2025\/04\/FINAL-PROJECT-NA.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of FINAL-PROJECT-NA.\"><\/object><a id=\"wp-block-file--media-e1ae44a5-aac3-4de2-96b7-cc1ae1175aea\" href=\"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-content\/uploads\/sites\/34299\/2025\/04\/FINAL-PROJECT-NA.pdf\">FINAL-PROJECT-NA<\/a><\/div>\n\n\n\n<p>While I mentioned one soft skill, this project itself is the accumulation of all the skills aforementioned throughout the skills page. It is a lengthy report that compiles the work I have accomplished using Linux systems, understanding cybersecurity topics, and making a detailed report of my findings into a deliverable.<\/p>\n\n\n\n<ul>\n<li>IDS 300W final essay<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-content\/uploads\/sites\/34299\/2025\/04\/IDS-300W-final-essay-NA.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of IDS-300W-final-essay-NA.\"><\/object><a id=\"wp-block-file--media-bd4b7e45-bfee-4db6-89a4-12782763de06\" href=\"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-content\/uploads\/sites\/34299\/2025\/04\/IDS-300W-final-essay-NA.pdf\">IDS-300W-final-essay-NA<\/a><\/div>\n\n\n\n<ul>\n<li>IRP process<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-content\/uploads\/sites\/34299\/2025\/04\/The-IRP-Interdisciplinary-Research-Process-NA.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of The-IRP-Interdisciplinary-Research-Process-NA.\"><\/object><a id=\"wp-block-file--media-fabbad27-0112-42d3-bfd4-ccf00975e2f3\" href=\"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-content\/uploads\/sites\/34299\/2025\/04\/The-IRP-Interdisciplinary-Research-Process-NA.pdf\">The-IRP-Interdisciplinary-Research-Process-NA<\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\"><strong data-cy=\"bold\">Technical skills <\/strong><\/h1>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><strong><span style=\"font-size: revert\">Able to use Linux-based systems and Metasploit<\/span> <\/strong><\/h2>\n\n\n\n<p>The cybersecurity curriculum offers different operating systems, such as Python, Windows, and Linux. I prefer to choose Kali-based systems due to their vast array of tools for security testing and my prior experience navigating the environment. Below are the attachments showing examples of utilizing Kali-based systems for pen testing; most of the assignments showcased are labs, as they are equivalents of applied learning. However, the homework attachments are a prelude to lab-based assignments.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Artifacts<\/h2>\n\n\n\n<ul>\n<li><p><em data-cy=\"italic\">Lab 2: Set UID Attacks<\/em><\/p><\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-content\/uploads\/sites\/34299\/2025\/04\/MSIM-470-lab-2-NA.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of MSIM-470-lab-2-NA.\"><\/object><a id=\"wp-block-file--media-52761311-3769-4415-b0a1-e001728c8888\" href=\"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-content\/uploads\/sites\/34299\/2025\/04\/MSIM-470-lab-2-NA.pdf\">MSIM-470-lab-2-NA<\/a><\/div>\n\n\n\n<ul>\n<li><p>Prelude to UID Attack Lab<\/p><\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-content\/uploads\/sites\/34299\/2025\/04\/MSIM-470-HW2-NA.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of MSIM-470-HW2-NA.\"><\/object><a id=\"wp-block-file--media-63b6a50d-7bc7-4311-9fe0-eec3e5c00203\" href=\"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-content\/uploads\/sites\/34299\/2025\/04\/MSIM-470-HW2-NA.pdf\">MSIM-470-HW2-NA<\/a><\/div>\n\n\n\n<ul>\n<li><p><em data-cy=\"italic\">Lab 3: Buffer Overflow<\/em><\/p><\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-content\/uploads\/sites\/34299\/2025\/04\/MSIM470-lab-3-na.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of MSIM470-lab-3-na.\"><\/object><a id=\"wp-block-file--media-38a28fba-4b40-4f1c-a853-767a30235d92\" href=\"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-content\/uploads\/sites\/34299\/2025\/04\/MSIM470-lab-3-na.pdf\">MSIM470-lab-3-na<\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\"><strong data-cy=\"bold\">Detailed knowledge of key technologies<\/strong><\/h1>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center has-medium-font-size\" style=\"text-transform:none\"><p>Understanding key concepts of cybersecurity<\/p><\/h2>\n\n\n\n<p>Key concepts are the main foundations of cybersecurity and must be thoroughly understood to protect assets from different attack vectors. Listed below, I continue to strive for a detail-orientated approach to my assignments whilst learning through the labs and assignments that help me reinforce what I\u2019ve learned in my classes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Artifacts<\/h2>\n\n\n\n<ul>\n<li> Assignment #1 Explore CCIA virtual environment and basic Linux commands <\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-content\/uploads\/sites\/34299\/2025\/04\/Lab1-CYSE-301-NeriahA.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Lab1-CYSE-301-NeriahA.\"><\/object><a id=\"wp-block-file--media-c3d9e295-f035-40e6-a6a0-e6b1747a9a93\" href=\"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-content\/uploads\/sites\/34299\/2025\/04\/Lab1-CYSE-301-NeriahA.pdf\">Lab1-CYSE-301-NeriahA<\/a><\/div>\n\n\n\n<ul>\n<li><p>Assignment #2 Getting Started with Wireshark\/Traffic Tracing and Sniffing<\/p><\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-content\/uploads\/sites\/34299\/2025\/04\/Lab2-CYSE-301-NeriahA.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Lab2-CYSE-301-NeriahA.\"><\/object><a id=\"wp-block-file--media-c39e7f29-0802-4a64-a169-f8d00cc8abb8\" href=\"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-content\/uploads\/sites\/34299\/2025\/04\/Lab2-CYSE-301-NeriahA.pdf\">Lab2-CYSE-301-NeriahA<\/a><\/div>\n\n\n\n<ul>\n<li><p><span style=\"font-size: revert\">Assignment # 4 Ethical hacking<\/span> <\/p><\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-content\/uploads\/sites\/34299\/2025\/04\/Assign4-CYSE-301-NeriahA.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assign4-CYSE-301-NeriahA.\"><\/object><a id=\"wp-block-file--media-89da89f5-87df-431f-adfc-c1f6e9f3541f\" href=\"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-content\/uploads\/sites\/34299\/2025\/04\/Assign4-CYSE-301-NeriahA.pdf\">Assign4-CYSE-301-NeriahA<\/a><\/div>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Essential Work\/Soft Skills Detail Oriented Being detail-oriented is necessary to avoid making careless mistakes that can impact company performance. During my academic career, I almost always followed a checklist to ensure I satisfied the requirements of any project or deliverable given to me. This ensured that everything was taken care of and that I never&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/neriahalcantara\/skills-2\/\">Read More<\/a><\/div>\n","protected":false},"author":27576,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-json\/wp\/v2\/users\/27576"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":356,"href":"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-json\/wp\/v2\/pages\/218\/revisions\/356"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/neriahalcantara\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}