{"id":149,"date":"2022-09-16T13:00:03","date_gmt":"2022-09-16T13:00:03","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=149"},"modified":"2024-04-20T02:48:22","modified_gmt":"2024-04-20T02:48:22","slug":"skills","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/nir\/skills\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<p><strong>Essential work Habits <\/strong><\/p>\n\n\n\n<ul>\n<li>Ability to work methodically and is very detailed oriented <\/li>\n\n\n\n<li>Eagerness to dig into technical questions and examine them from all sides <\/li>\n\n\n\n<li>Enthusiastic and highly adaptable <\/li>\n\n\n\n<li>Strong analytical and diagnostic skills <\/li>\n\n\n\n<li>Demonstrated skills in innovation and collaboration <\/li>\n\n\n\n<li>Keep a current understanding of vulnerabilities from the Internet <\/li>\n\n\n\n<li>Maintaining awareness and knowledge of contemporary standards, proactices, procedures and methods <\/li>\n\n\n\n<li>Ability to get the job done <\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Artical-Review-1-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Artical-Review-1-1.\"><\/object><a id=\"wp-block-file--media-652e0ca0-fc2f-4a4d-869a-f175398b2739\" href=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Artical-Review-1-1.pdf\">Artical-Review-1-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Artical-Review-1-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-652e0ca0-fc2f-4a4d-869a-f175398b2739\">Download<\/a><\/div>\n\n\n\n<p><strong>Soft skills<\/strong> <\/p>\n\n\n\n<ul>\n<li>Excellent presentation and communications skills to effectively communicate with management and customers <\/li>\n\n\n\n<li>Ability to clearly articulate complex concepts both written and verbally <\/li>\n\n\n\n<li>Ability, understanding, and usage of active listening skills especially with customers <\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Business-Issues-paper-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Business-Issues-paper-1.\"><\/object><a id=\"wp-block-file--media-45fed736-413a-4a7f-ba7d-7ba9f2d10427\" href=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Business-Issues-paper-1.pdf\">Business-Issues-paper-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Business-Issues-paper-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-45fed736-413a-4a7f-ba7d-7ba9f2d10427\">Download<\/a><\/div>\n\n\n\n<p><strong>Sold Technical Foundation <\/strong><\/p>\n\n\n\n<ul>\n<li>Understand architecture, administration, and management of operating systems, networking, and virtualization software<\/li>\n\n\n\n<li>General programming\/software development concepts and software analytical skills <\/li>\n\n\n\n<li>Proficiency in programming in Java, C\/C++, disassemblers and assembly language and programming knowledge of two or more scripting languages (PHP, Python, Perl, or shell)<\/li>\n\n\n\n<li>Understanding of how the different type of firewalls and network load balances work <\/li>\n\n\n\n<li>Deep understanding of how network routers and switches work<\/li>\n\n\n\n<li>Evaluate and design systems and network architectures <\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Could-Python-be-replaced-in-the-future.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Could-Python-be-replaced-in-the-future.\"><\/object><a id=\"wp-block-file--media-60ad935c-186b-4039-8c69-4a1bb7f858d4\" href=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Could-Python-be-replaced-in-the-future.pdf\">Could-Python-be-replaced-in-the-future<\/a><a href=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Could-Python-be-replaced-in-the-future.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-60ad935c-186b-4039-8c69-4a1bb7f858d4\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Assignment-3-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-3-2.\"><\/object><a id=\"wp-block-file--media-a115d31a-4c8c-46b5-8938-24c51dbc1a7e\" href=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Assignment-3-2.pdf\">Assignment-3-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Assignment-3-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-a115d31a-4c8c-46b5-8938-24c51dbc1a7e\">Download<\/a><\/div>\n\n\n\n<p><strong>Detailed Knowledge of Key Technologies <\/strong><\/p>\n\n\n\n<ul>\n<li>Open Source Applications <\/li>\n\n\n\n<li>Linux Operating Systems <\/li>\n\n\n\n<li>Microsoft Technologies <\/li>\n\n\n\n<li>Wireless Technologies <\/li>\n\n\n\n<li>Database Modeling <\/li>\n\n\n\n<li>Web Application Technologies <\/li>\n\n\n\n<li>Compiled and Interpreted Development Languages <\/li>\n\n\n\n<li>Network Implementation (Operational and Security) <\/li>\n\n\n\n<li>Telephony Technologies (Analog and IP) <\/li>\n\n\n\n<li>Social Engineering <\/li>\n\n\n\n<li>Physical Security <\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/module-7-assignment-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of module-7-assignment-1.\"><\/object><a id=\"wp-block-file--media-d4c48e1b-cd07-4252-b767-2c825a8d8b5b\" href=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/module-7-assignment-1.pdf\">module-7-assignment-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/module-7-assignment-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-d4c48e1b-cd07-4252-b767-2c825a8d8b5b\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Assignment-2-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-2-1.\"><\/object><a id=\"wp-block-file--media-2d3d6484-4123-4dac-b83c-b348844d1de0\" href=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Assignment-2-1.pdf\">Assignment-2-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Assignment-2-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-2d3d6484-4123-4dac-b83c-b348844d1de0\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Short-Research-paper-2-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Short-Research-paper-2-1.\"><\/object><a id=\"wp-block-file--media-1ec5b498-825b-4837-83dc-5c9693a99a93\" href=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Short-Research-paper-2-1.pdf\">Short-Research-paper-2-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Short-Research-paper-2-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-1ec5b498-825b-4837-83dc-5c9693a99a93\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Essential work Habits Soft skills Sold Technical Foundation Detailed Knowledge of Key Technologies<\/p>\n","protected":false},"author":24833,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/pages\/149"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/users\/24833"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/comments?post=149"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/pages\/149\/revisions"}],"predecessor-version":[{"id":462,"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/pages\/149\/revisions\/462"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/media?parent=149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}