{"id":210,"date":"2023-11-26T14:35:35","date_gmt":"2023-11-26T14:35:35","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/rbaduids493\/?p=210"},"modified":"2023-11-26T16:27:45","modified_gmt":"2023-11-26T16:27:45","slug":"cybersecurity-skills-and-artifacts-showcase","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/rbaduids493\/2023\/11\/26\/cybersecurity-skills-and-artifacts-showcase\/","title":{"rendered":"Cybersecurity Skills and Artifacts Showcase"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<p>Rebecca Badu<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cybersecurity Major<\/h3>\n\n\n\n<p><strong>Contact Information:<\/strong><\/p>\n\n\n\n<ul>\n<li>Email: rbadu001@odu.edu<\/li>\n\n\n\n<li>LinkedIn: www.linkedin.com\/in\/rebeccabadu\/<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Summary<\/h2>\n\n\n\n<p>I am a dedicated and motivated cybersecurity major with a passion for securing digital environments and mitigating cyber threats. My academic background, hands-on experiences, and commitment to staying current with industry trends make me a well-rounded candidate in the field of cybersecurity. This document highlights some of my key skills and artifacts that demonstrate my capabilities.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Skills<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. <strong>Technical Proficiency<\/strong><\/h3>\n\n\n\n<ul>\n<li><strong>Operating Systems:<\/strong> Proficient in Windows, Linux, and macOS environments.<\/li>\n\n\n\n<li><strong>Networking:<\/strong> Solid understanding of TCP\/IP, DNS, VPNs, firewalls, and network protocols.<\/li>\n\n\n\n<li><strong>Programming:<\/strong> Proficient in Python, C, and Java for scripting and automation.<\/li>\n\n\n\n<li><strong>Cybersecurity Tools:<\/strong> Experienced with tools such as Wireshark, Nmap, Snort, Metasploit, and Burp Suite.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<p>Throughout my academic path, I actively participated in a CYSE 250 Basic Cybersecurity Programming and Networking course, which offered a thorough grasp of programming languages (Python), setting up virtual machines, and basic network configurations. The presented assignment below exemplifies a successfully executed lab exercise focusing on using python to write a program.<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-e194f000-0f58-4abc-bbd1-e83c221c3534\" href=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/File3.jpg\">File3<\/a><a href=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/File3.jpg\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e194f000-0f58-4abc-bbd1-e83c221c3534\">Download<\/a><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/image.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"549\" src=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/image-1024x549.png\" alt=\"\" class=\"wp-image-218\" srcset=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/image-1024x549.png 1024w, https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/image-300x161.png 300w, https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/image-768x412.png 768w, https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/image-600x322.png 600w, https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/image-945x507.png 945w, https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/image.png 1339w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><br>Linux Fundamentals Course: In the course of my academic pursuits, I enrolled in a Linux Fundamentals program that imparted a thorough comprehension of crucial Linux commands, the establishment of virtual machines, and basic network configurations. The forthcoming assignment illustrates a concluded lab exercise focused on network configuration.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/Screenshot-4.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"768\" src=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/Screenshot-4-1024x768.png\" alt=\"\" class=\"wp-image-233\" srcset=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/Screenshot-4-1024x768.png 1024w, https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/Screenshot-4-300x225.png 300w, https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/Screenshot-4-768x576.png 768w, https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/Screenshot-4-600x450.png 600w, https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/Screenshot-4-945x709.png 945w, https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/Screenshot-4.png 1049w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">2. <strong>Incident Response and Forensics<\/strong><\/h3>\n\n\n\n<ul>\n<li><strong>Incident Handling:<\/strong> Hands-on experience in identifying, containing, and eradicating security incidents.<\/li>\n\n\n\n<li><strong>Forensic Analysis:<\/strong> Skilled in conducting digital forensics investigations, including disk analysis and memory forensics.<\/li>\n<\/ul>\n\n\n\n<p>At my current job I&#8217;ve had the opportunity to work as part of the incident response team using this format to generate an incident response plan. <\/p>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/vul.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/vul.jpg\" alt=\"\" class=\"wp-image-249\" width=\"829\" height=\"491\" srcset=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/vul.jpg 740w, https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/vul-300x178.jpg 300w, https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/vul-600x355.jpg 600w\" sizes=\"(max-width: 829px) 100vw, 829px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">3. <strong>Cybersecurity Policy and Compliance<\/strong><\/h3>\n\n\n\n<ul>\n<li><strong>Policy Development:<\/strong> Developed and documented cybersecurity policies aligned with industry standards.<\/li>\n\n\n\n<li><strong>Compliance:<\/strong> Familiar with regulatory frameworks such as GDPR, HIPAA, and NIST standards.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">4. <strong>Vulnerability Assessment and Penetration Testing<\/strong><\/h3>\n\n\n\n<ul>\n<li><strong>Vulnerability Scanning:<\/strong> Utilized tools like Nessus and OpenVAS to identify and remediate vulnerabilities.<\/li>\n\n\n\n<li><strong>Penetration Testing:<\/strong> Conducted ethical hacking exercises to assess system and application security.<\/li>\n<\/ul>\n\n\n\n<p>An example of what a vulnerability assessment looks like and can be found in the link below (NIST 800-61 Rev2). My team works on this as well. <\/p>\n\n\n\n<p><a href=\"https:\/\/www.cisa.gov\/sites\/default\/files\/publications\/Federal_Government_Cybersecurity_Incident_and_Vulnerability_Response_Playbooks_508C.pdf\">Federal Government Cybersecurity Incident and Vulnerability Response Playbooks (cisa.gov)<\/a><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/Incident-response-2.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"801\" height=\"467\" src=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/Incident-response-2.jpg\" alt=\"\" class=\"wp-image-246\" srcset=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/Incident-response-2.jpg 801w, https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/Incident-response-2-300x175.jpg 300w, https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/Incident-response-2-768x448.jpg 768w, https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/Incident-response-2-600x350.jpg 600w\" sizes=\"(max-width: 801px) 100vw, 801px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full is-resized\"><a href=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/Incident.jpg\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/Incident.jpg\" alt=\"\" class=\"wp-image-247\" width=\"802\" height=\"459\" srcset=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/Incident.jpg 626w, https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/Incident-300x172.jpg 300w, https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/Incident-600x343.jpg 600w\" sizes=\"(max-width: 802px) 100vw, 802px\" \/><\/a><\/figure>\n\n\n\n<p><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">5. <strong>Security Awareness and Training<\/strong> and Certifications<\/h3>\n\n\n\n<ul>\n<li><strong>Training Programs:<\/strong> Developed and delivered cybersecurity awareness training sessions for end-users.<\/li>\n\n\n\n<li><strong>Phishing Simulations:<\/strong> Implemented and analyzed phishing simulations to enhance user awareness.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/sec.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"788\" src=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/sec-1024x788.jpg\" alt=\"\" class=\"wp-image-266\" srcset=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/sec-1024x788.jpg 1024w, https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/sec-300x231.jpg 300w, https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/sec-768x591.jpg 768w, https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/sec-600x461.jpg 600w, https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/sec-945x727.jpg 945w, https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/sec.jpg 1061w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Artifacts<\/h2>\n\n\n\n<h3 class=\"wp-block-heading\">1. <strong>Capstone Project: Secure Network Simulation<\/strong><\/h3>\n\n\n\n<ul>\n<li><strong>Description:<\/strong> Designed and implemented a secure network architecture, including firewalls, intrusion detection systems, and VPNs.<\/li>\n\n\n\n<li><strong>Outcome:<\/strong> Successfully defended against simulated cyber-attacks, demonstrating the ability to design and implement robust security solutions.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">2. <strong>Internship: Security Analyst at Department of Veterans Affair<\/strong>s<\/h3>\n\n\n\n<ul>\n<li><strong>Responsibilities:<\/strong> Monitored and analyzed security alerts, conducted vulnerability assessments, and assisted in incident response.<\/li>\n\n\n\n<li><strong>Achievement:<\/strong> Implemented security measures that reduced the organization&#8217;s overall vulnerability score by 20%.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>As a cybersecurity major, I have developed a comprehensive skill set through academic studies, practical experiences, and continuous learning. The artifacts presented here showcase my ability to apply theoretical knowledge in real-world scenarios, contribute to the cybersecurity community, and adapt to the dynamic landscape of information security.<\/p>\n\n\n\n<p>I am excited about the opportunity to further apply and expand my skills in a professional setting, contributing to the ongoing effort to secure digital assets and networks.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-e78845b0-ba7e-4975-ac72-8b43208bc8a9\" href=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/loop3.jpg\">loop3<\/a><a href=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-content\/uploads\/sites\/34043\/2023\/11\/loop3.jpg\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e78845b0-ba7e-4975-ac72-8b43208bc8a9\"><\/a><\/div>\n\n\n\n\n","protected":false},"excerpt":{"rendered":"<p>Rebecca Badu Cybersecurity Major Contact Information: Summary I am a dedicated and motivated cybersecurity major with a passion for securing digital environments and mitigating cyber threats. My academic background, hands-on experiences, and commitment to staying current with industry trends make&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/rbaduids493\/2023\/11\/26\/cybersecurity-skills-and-artifacts-showcase\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":22965,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-json\/wp\/v2\/posts\/210"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-json\/wp\/v2\/users\/22965"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-json\/wp\/v2\/comments?post=210"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-json\/wp\/v2\/posts\/210\/revisions"}],"predecessor-version":[{"id":267,"href":"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-json\/wp\/v2\/posts\/210\/revisions\/267"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-json\/wp\/v2\/media?parent=210"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-json\/wp\/v2\/categories?post=210"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/rbaduids493\/wp-json\/wp\/v2\/tags?post=210"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}