{"id":218,"date":"2024-01-24T18:03:53","date_gmt":"2024-01-24T18:03:53","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2024-04-11T00:33:04","modified_gmt":"2024-04-11T00:33:04","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/pm1\/skills-2\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<p><b>Essential Work Habits<\/b><\/p>\n\n\n\n<ul>\n<li>Persistence: I\u2019m prepared to tackle difficult problems, learn from failures, and persist until you find solutions.<\/li>\n\n\n\n<li>Adaptability: I\u2019m flexible and open to change and new ideas. I take pride in my ability to adjust to new situations and environments quickly and as needed.&nbsp;<\/li>\n\n\n\n<li>Critical Thinking: I tend to approach problems with a questioning mindset to uncover vulnerabilities and devise effective solutions.<\/li>\n\n\n\n<li>Time Management: I make it a mission to&nbsp; manage time effectively to balance coursework, self-study, and any practical projects or internships. I prioritize tasks based on urgency and importance.<\/li>\n\n\n\n<li>Accountability: I take ownership of my actions, acknowledging any mistakes and learning from them. I use this to garner trust, respect, and growth professionally when it comes to teams and organizations that I am involved with.&nbsp;<\/li>\n\n\n\n<li>Attention to Detail: I pay very close attention to small details to maximize accuracy, quality, and thoroughness in tasks and other deliverables. This approach helps mitigate any errors made and allows for professional growth.<\/li>\n\n\n\n<li>Organization: I like to maintain a tidy workspace and lay my task out before me with lists in hopes of boosting productivity and efficiency. This helps with balancing focus and prioritization of tasks at hand.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><b>Soft Skills<\/b><\/p>\n\n\n\n<ul>\n<li>Communication: I take pride in my communication and presentation skills, both writing and speaking. I make sure to listen to what people have to say and emphasize that communication is a two way street.&nbsp;<\/li>\n\n\n\n<li>Teamwork\/Collaboration: I work most effectively in group settings, sharing information and collaborating on different projects. This goes a long way when trying to complete a project.<\/li>\n\n\n\n<li>Curiosity: A curious mindset drives continuous learning and exploration in cybersecurity. We, as students, should be naturally curious about how systems work, how threats evolve, and how security measures can be improved.<\/li>\n\n\n\n<li>Problem Solving: I enjoy puzzles and other difficult problems. I\u2019m very analytic with my thought processes and always take everything into consideration.&nbsp;<\/li>\n\n\n\n<li>Leadership: I take leadership very seriously, whether it\u2019s me at the helm or a classmate leading the charge on a project. I have a knack for delegating tasks and taking initiative on different projects.&nbsp;<\/li>\n\n\n\n<li>Creativity: We, as cybersecurity students\/professionals, often need to think outside the box to anticipate and mitigate risks or find different angles to situations . Creativity is valuable for devising innovative solutions to complex problems.<\/li>\n<\/ul>\n\n\n\n<p><b>Solid Technical Foundation<\/b><\/p>\n\n\n\n<ul>\n<li>Operating Systems: I am very proficient in various operating systems, mainly Linux, Windows, MacOS, and some server OS\u2019s. I can handle configuration, installation, troubleshooting, and updating these operating systems.<\/li>\n\n\n\n<li>Computer Hardware: I am familiar with the different types of computer hardware; components, peripherals, etc. I can assemble and disassemble towers and laptops without many issues and I can troubleshoot any hardware issues.<\/li>\n\n\n\n<li>Network Fundamentals: I have a vast knowledge of the OSI Model and network architecture and topographies. I understand the use of many protocols and methods for networking such TCP\/IP, subnetting, IP addresses, and routing.<\/li>\n\n\n\n<li>Computer Software: I have a deep understanding of different computer software packages and programs. I am proficient in Microsoft softwares, Virtualization softwares like VirtualBox and Oracle, as well as programs such as Autopsy and Wireshark.<\/li>\n\n\n\n<li>Security Technologies: I have an extensive knowledge of firewall rules and how to enable them on computer systems. I understand the usage of IDS\/IPS, antivirus software, and VPNs and how they protect various systems and servers.&nbsp;<\/li>\n\n\n\n<li>Security Compliance and Regulations: I understand the many cybersecurity laws, regulations, and standards such as GDPR, HIPAA, PCI DSS, and NIST framework. I have knowledge of many government acts and regulations such as the many Privacy Acts.<\/li>\n<\/ul>\n\n\n\n<p><b>Detailed Knowledge of Key Technologies<\/b><\/p>\n\n\n\n<ul>\n<li>Cryptography: I have a basic understanding of the many cryptographic methods of encryption and decryption. Examples include block ciphers, Diffie-Hellman Key Exchange, and RSA.<\/li>\n\n\n\n<li>Digital Forensics: I have a good understanding of how digital forensics works and how to create reports that describe different types of evidence that may be found in an investigation. I can administer an Autopsy report\/scan of an electronic device and find missing files that may exist.&nbsp;<\/li>\n\n\n\n<li>Virtualization and Virtual Machines: This is something that I take the most pride in. Initializing virtual machines and tinkering with them has to be a skill that I have enjoyed honing. In the same vein, I have proficiency with command line interfaces within virtual and physical machines.<\/li>\n\n\n\n<li>Cybercrime and the Darknet: Due to some of my coursework, I have a small understanding of how the darknet works and what it looks like. I have decent knowledge of cybercrime and the different types that occur in our society today.&nbsp;<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Essential Work Habits Soft Skills Solid Technical Foundation Detailed Knowledge of Key Technologies<\/p>\n","protected":false},"author":27146,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/users\/27146"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":447,"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/pages\/218\/revisions\/447"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}