{"id":325,"date":"2026-04-16T15:06:49","date_gmt":"2026-04-16T15:06:49","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/seanshreve\/?page_id=325"},"modified":"2026-04-18T00:53:12","modified_gmt":"2026-04-18T00:53:12","slug":"technical-communication-systems-documentation","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/seanshreve\/technical-communication-systems-documentation\/","title":{"rendered":"Technical Communication &amp; Systems Documentation"},"content":{"rendered":"\n<p>Technical communication and documentation are essential for translating complex cybersecurity concepts into clear, actionable information. Through my coursework, I have developed the ability to communicate technical ideas to both technical and non-technical audiences, as well as present cybersecurity concepts in a structured and professional manner.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Securing Information Systems (IT201 Discussion Post)<\/h2>\n\n\n\n<p>This discussion post focused on analyzing how organizations secure information systems using layered cybersecurity strategies. I explained the use of defense-in-depth approaches, integrating policies, identity and access management, encryption, and security audits to protect modern systems.<\/p>\n\n\n\n<p>I also examined the role of key security tools, including firewalls, intrusion detection and prevention systems (IDS\/IPS), multifactor authentication (MFA), and encryption protocols, as well as the financial impact of cybersecurity. The analysis compared the cost of implementing security measures against the significantly higher cost of data breaches, reinforcing the importance of proactive security investment.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/seanshreve\/wp-content\/uploads\/sites\/40853\/2026\/04\/IT201_Module-10_Discussion.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of IT201_Module-10_Discussion.\"><\/object><a id=\"wp-block-file--media-269f854f-562d-4989-a784-e5438e65244c\" href=\"https:\/\/sites.wp.odu.edu\/seanshreve\/wp-content\/uploads\/sites\/40853\/2026\/04\/IT201_Module-10_Discussion.pdf\">IT201_Module-10_Discussion<\/a><a href=\"https:\/\/sites.wp.odu.edu\/seanshreve\/wp-content\/uploads\/sites\/40853\/2026\/04\/IT201_Module-10_Discussion.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-269f854f-562d-4989-a784-e5438e65244c\">Download<\/a><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-medium-font-size\">Windows Management &amp; Federal Cybersecurity (CYSE 280)<\/h2>\n\n\n\n<p><\/p>\n\n\n\n<p>PLACEHOLDER, PAPER WILL BE POSTED AFTER COMPLETION<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p><a href=\"https:\/\/sites.wp.odu.edu\/seanshreve\/systems-maintenance-technical-troubleshooting\/\">\u2190 Previous Skill<br>Systems Maintenance and Technical Troubleshooting<\/a><\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\"><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Technical communication and documentation are essential for translating complex cybersecurity concepts into clear, actionable information. Through my coursework, I have developed the ability to communicate technical ideas to both technical and non-technical audiences, as well as present cybersecurity concepts in a structured and professional manner. Securing Information Systems (IT201 Discussion Post) This discussion post focused&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/seanshreve\/technical-communication-systems-documentation\/\">Read More<\/a><\/div>\n","protected":false},"author":32185,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/seanshreve\/wp-json\/wp\/v2\/pages\/325"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/seanshreve\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/seanshreve\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/seanshreve\/wp-json\/wp\/v2\/users\/32185"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/seanshreve\/wp-json\/wp\/v2\/comments?post=325"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/seanshreve\/wp-json\/wp\/v2\/pages\/325\/revisions"}],"predecessor-version":[{"id":386,"href":"https:\/\/sites.wp.odu.edu\/seanshreve\/wp-json\/wp\/v2\/pages\/325\/revisions\/386"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/seanshreve\/wp-json\/wp\/v2\/media?parent=325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}