{"id":218,"date":"2023-09-18T15:12:21","date_gmt":"2023-09-18T15:12:21","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2025-04-29T00:36:41","modified_gmt":"2025-04-29T00:36:41","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/skills-2\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"392\" height=\"220\" src=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/Skills-Image.jpg\" alt=\"\" class=\"wp-image-352\" style=\"width:627px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/Skills-Image.jpg 392w, https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/Skills-Image-300x168.jpg 300w\" sizes=\"(max-width: 392px) 100vw, 392px\" \/><\/figure>\n\n\n\n<p><strong>Technical Skills<\/strong><\/p>\n\n\n\n<ul>\n<li>Digital Forensics<\/li>\n\n\n\n<li>Cryptography<\/li>\n\n\n\n<li>Penetration Testing&nbsp;<\/li>\n\n\n\n<li>Ethical Hacking&nbsp;<\/li>\n\n\n\n<li>Programming Experience( Python, C++, Kali Linux,&nbsp; Unbuntu)<\/li>\n\n\n\n<li>Networking Fundamentals( Understanding of TCP\/IP, DNS, Firewalls, VPNs, and Routing)<\/li>\n<\/ul>\n\n\n\n<p><strong>Soft Skills<\/strong><\/p>\n\n\n\n<ul>\n<li>Great communication( I worked in a restaurant every summer throughout my college career where communication and teamwork is needed to succeed in the food industry)<\/li>\n\n\n\n<li>Great Teamwork skills( Worked in various group projects throughout my college career)<\/li>\n\n\n\n<li>Willing to constantly learn&nbsp;<\/li>\n\n\n\n<li>Very attentive to catch any vulnerabilities<\/li>\n\n\n\n<li>Critical thinking&nbsp;<\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/annotated-CYSE270-Lab11.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-CYSE270-Lab11.docx.\"><\/object><a id=\"wp-block-file--media-38b6280d-28c2-4d92-9ccb-35b8bad36aad\" href=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/annotated-CYSE270-Lab11.docx.pdf\">annotated-CYSE270-Lab11.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/annotated-CYSE270-Lab11.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-38b6280d-28c2-4d92-9ccb-35b8bad36aad\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/annotated-Assignment20320-20Sword20vs.20Shield-Fall2024-1.docx-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Assignment20320-20Sword20vs.20Shield-Fall2024-1.docx-1.\"><\/object><a id=\"wp-block-file--media-c4e11085-b82d-4dca-8049-416b7b79cc36\" href=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/annotated-Assignment20320-20Sword20vs.20Shield-Fall2024-1.docx-1.pdf\">annotated-Assignment20320-20Sword20vs.20Shield-Fall2024-1.docx-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/annotated-Assignment20320-20Sword20vs.20Shield-Fall2024-1.docx-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-c4e11085-b82d-4dca-8049-416b7b79cc36\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/annotated-IT41720Group20Project.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-IT41720Group20Project.\"><\/object><a id=\"wp-block-file--media-5b732b88-6671-4b9c-bc9c-1840222e7847\" href=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/annotated-IT41720Group20Project.pdf\">annotated-IT41720Group20Project<\/a><a href=\"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-content\/uploads\/sites\/34250\/2025\/04\/annotated-IT41720Group20Project.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-5b732b88-6671-4b9c-bc9c-1840222e7847\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Technical Skills Soft Skills<\/p>\n","protected":false},"author":27534,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/users\/27534"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":353,"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/pages\/218\/revisions\/353"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/pathways-to-cybersecurity-achievement-\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}