{"id":218,"date":"2022-09-08T19:58:03","date_gmt":"2022-09-08T19:58:03","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2026-03-10T00:35:33","modified_gmt":"2026-03-10T00:35:33","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/sagehensley\/skills-2\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<p>Below are a list of skills I view as essential to my abilities and that I have developed in my course of study. Each skill is accompanied by 3 artifacts that demonstrate the skill.<\/p>\n\n\n<h2><strong>Analytical Thinking:<\/strong><\/h2>\n<ul>\n<li>A paper I wrote for my Basic Cybersecurity Programming and Networking course that analyzes and evaluate the effectiveness and risks of AI-powered cybersecurity systems<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-7404aebe-7499-41d8-adf6-147fe3711815\" href=\"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-content\/uploads\/sites\/30320\/2026\/03\/The-Pivotal-Role-of-Artificial-Intelligence-In-Cybersecurity-2.docx\">The-Pivotal-Role-of-Artificial-Intelligence-In-Cybersecurity-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-content\/uploads\/sites\/30320\/2026\/03\/The-Pivotal-Role-of-Artificial-Intelligence-In-Cybersecurity-2.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-7404aebe-7499-41d8-adf6-147fe3711815\">Download<\/a><\/div>\n\n\n\n<ul>\n<li>An evaluation of The National Cybersecurity Strategy Implementation Plan written for my Cyber Policy course<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-80176f60-6e00-4ca6-8d3e-36a85b4a4545\" href=\"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-content\/uploads\/sites\/30320\/2026\/03\/Cyber-Strategy-and-Policy-Midterm-2.docx\">Cyber-Strategy-and-Policy-Midterm-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-content\/uploads\/sites\/30320\/2026\/03\/Cyber-Strategy-and-Policy-Midterm-2.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-80176f60-6e00-4ca6-8d3e-36a85b4a4545\">Download<\/a><\/div>\n\n\n\n<ul>\n<li>An ethical view of &#8220;vibe coding&#8221; seen through the Kantian perspective <\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-cbf4548a-5e4c-4348-b3c4-01b56a1142e8\" href=\"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-content\/uploads\/sites\/30320\/2026\/03\/novel-cyber-risks-case-study-2.docx\">novel-cyber-risks-case-study-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-content\/uploads\/sites\/30320\/2026\/03\/novel-cyber-risks-case-study-2.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-cbf4548a-5e4c-4348-b3c4-01b56a1142e8\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Ethical Hacking\/Penetration Testing: <\/h2>\n\n\n\n<ul>\n<li>Using tools within linux I created varying levels of password complexity and attempted to crack them<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-e0f6da77-b5d1-4d90-b226-e43f4301fad3\" href=\"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-content\/uploads\/sites\/30320\/2026\/03\/assignment-5-2-2.docx\">assignment-5-2-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-content\/uploads\/sites\/30320\/2026\/03\/assignment-5-2-2.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e0f6da77-b5d1-4d90-b226-e43f4301fad3\">Download<\/a><\/div>\n\n\n\n<ul>\n<li>Used reconnoissance tools to find active and open ports to determine best attack vector<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-69369e9b-10a4-469d-a254-4c032eb3e97d\" href=\"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-content\/uploads\/sites\/30320\/2026\/03\/Lab-3-Active-reconnaissance-Sage-Hensley-2-2.docx\">Lab-3-Active-reconnaissance-Sage-Hensley-2-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-content\/uploads\/sites\/30320\/2026\/03\/Lab-3-Active-reconnaissance-Sage-Hensley-2-2.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-69369e9b-10a4-469d-a254-4c032eb3e97d\">Download<\/a><\/div>\n\n\n\n<ul>\n<li>Hid and subsequently found imbedded text within an image using steganography <\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-5534d4ce-0ded-46bf-855a-11c8e74e8aa1\" href=\"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-content\/uploads\/sites\/30320\/2026\/03\/Lab-5-steganography.docx\">Lab-5-steganography<\/a><a href=\"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-content\/uploads\/sites\/30320\/2026\/03\/Lab-5-steganography.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-5534d4ce-0ded-46bf-855a-11c8e74e8aa1\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Network Security:<\/h2>\n\n\n\n<ul>\n<li>Completed a course along with extracurricular studying to earn my CompTIA Security+ certification <\/li>\n<\/ul>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-content\/uploads\/sites\/30320\/2026\/03\/CompTIA-Security-ce-certificate.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of CompTIA-Security-ce-certificate.\"><\/object><a id=\"wp-block-file--media-697d72e5-50d9-47cc-8d94-72c73109ea45\" href=\"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-content\/uploads\/sites\/30320\/2026\/03\/CompTIA-Security-ce-certificate.pdf\">CompTIA-Security-ce-certificate<\/a><a href=\"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-content\/uploads\/sites\/30320\/2026\/03\/CompTIA-Security-ce-certificate.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-697d72e5-50d9-47cc-8d94-72c73109ea45\">Download<\/a><\/div>\n\n\n\n<ul>\n<li>Used network traffic tools such as Wireshark to analyze traffic and discover unencrypted data<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-48065eb4-dcd7-47f9-8d80-d0124f05b229\" href=\"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-content\/uploads\/sites\/30320\/2026\/03\/2-Traffic-and-Sniffing-2-2.docx\">2-Traffic-and-Sniffing-2-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-content\/uploads\/sites\/30320\/2026\/03\/2-Traffic-and-Sniffing-2-2.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-48065eb4-dcd7-47f9-8d80-d0124f05b229\">Download<\/a><\/div>\n\n\n\n<ul>\n<li>Acted as an attacker to identify the vulnerabilities in the LAN network and also as a defender to apply proper countermeasures<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-9905c6f5-bfad-48c5-b9f6-207877858a33\" href=\"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-content\/uploads\/sites\/30320\/2026\/03\/Assignment-3-Sword-vs.-Shield-Fall2024-1-1-3-2.docx\">Assignment-3-Sword-vs.-Shield-Fall2024-1-1-3-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-content\/uploads\/sites\/30320\/2026\/03\/Assignment-3-Sword-vs.-Shield-Fall2024-1-1-3-2.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-9905c6f5-bfad-48c5-b9f6-207877858a33\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Below are a list of skills I view as essential to my abilities and that I have developed in my course of study. Each skill is accompanied by 3 artifacts that demonstrate the skill. Analytical Thinking: A paper I wrote for my Basic Cybersecurity Programming and Networking course that analyzes and evaluate the effectiveness and&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/sagehensley\/skills-2\/\">Read More<\/a><\/div>\n","protected":false},"author":24774,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-json\/wp\/v2\/users\/24774"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":382,"href":"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-json\/wp\/v2\/pages\/218\/revisions\/382"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sagehensley\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}