{"id":149,"date":"2024-09-23T00:21:24","date_gmt":"2024-09-23T00:21:24","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=149"},"modified":"2026-02-20T16:47:41","modified_gmt":"2026-02-20T16:47:41","slug":"skills","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/seconomos\/skills\/","title":{"rendered":"Technical Skills (NACE: Technology)"},"content":{"rendered":"\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/seconomos\/wp-content\/uploads\/sites\/37254\/2026\/02\/Technical-Skills-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Technical-Skills-1.\"><\/object><a id=\"wp-block-file--media-a1b6aacb-64fb-4fd5-913a-7e5ff98fc1eb\" href=\"https:\/\/sites.wp.odu.edu\/seconomos\/wp-content\/uploads\/sites\/37254\/2026\/02\/Technical-Skills-1.pdf\">Technical-Skills-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/seconomos\/wp-content\/uploads\/sites\/37254\/2026\/02\/Technical-Skills-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-a1b6aacb-64fb-4fd5-913a-7e5ff98fc1eb\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/seconomos\/wp-content\/uploads\/sites\/37254\/2026\/02\/Technical-Skills-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Technical-Skills-2.\"><\/object><a id=\"wp-block-file--media-f8e314dd-b898-4513-9ce6-1dba81f1f007\" href=\"https:\/\/sites.wp.odu.edu\/seconomos\/wp-content\/uploads\/sites\/37254\/2026\/02\/Technical-Skills-2.pdf\">Technical-Skills-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/seconomos\/wp-content\/uploads\/sites\/37254\/2026\/02\/Technical-Skills-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f8e314dd-b898-4513-9ce6-1dba81f1f007\">Download<\/a><\/div>\n\n\n\n<p><strong>What did I do?<\/strong><br>I completed hands-on Linux system administration tasks that involved identifying storage devices, partitioning disks, creating filesystems, mounting volumes, and verifying system configurations using command-line tools. I also wrote and executed Bash scripts that used conditional logic to automate file and directory checks.<\/p>\n\n\n\n<p><strong>What did I value about this experience?<\/strong><br>I valued working directly in the terminal without relying on graphical interfaces, as it helped me better understand how Linux systems operate at a fundamental level.<\/p>\n\n\n\n<p><strong>What lesson did I learn?<\/strong><br>I learned that small configuration errors can have significant system-wide impacts, which reinforced the importance of precision and verification in system administration.<\/p>\n\n\n\n<p><strong>How did this experience develop a particular skill or competency?<\/strong><br>These assignments strengthened my technical skills by improving my confidence in navigating Linux systems and performing administrative tasks commonly used in cybersecurity environments.<\/p>\n\n\n\n<p><strong>How might I use this skill or insight in the future?<\/strong><br>I will apply these skills when working with Linux-based servers, analyzing compromised systems, or supporting security operations in professional cybersecurity roles.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h1 class=\"wp-block-heading\">Critical Thinking (NACE: Critical Thinking)<\/h1>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/seconomos\/wp-content\/uploads\/sites\/37254\/2026\/02\/Critical-Thinking-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Critical-Thinking-1.\"><\/object><a id=\"wp-block-file--media-9f14d718-0c42-4395-8d5c-f86080de0f38\" href=\"https:\/\/sites.wp.odu.edu\/seconomos\/wp-content\/uploads\/sites\/37254\/2026\/02\/Critical-Thinking-1.pdf\">Critical-Thinking-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/seconomos\/wp-content\/uploads\/sites\/37254\/2026\/02\/Critical-Thinking-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-9f14d718-0c42-4395-8d5c-f86080de0f38\">Download<\/a><\/div>\n\n\n\n<p><strong>What did I do?<\/strong><br>I designed a secure and scalable Ethernet network for a multi-floor academic building, incorporating cabling standards, redundancy, bandwidth planning, and security controls such as VLAN segmentation and firewall placement.<\/p>\n\n\n\n<p><strong>What did I value about this experience?<\/strong><br>I valued the opportunity to apply theoretical networking concepts to a realistic scenario that required balancing performance, security, and cost.<\/p>\n\n\n\n<p><strong>What lesson did I learn?<\/strong><br>I learned that effective network design requires anticipating future growth and potential failures, not just ensuring basic connectivity.<\/p>\n\n\n\n<p><strong>How did this experience develop a particular skill or competency?<\/strong><br>This project developed my critical thinking skills by requiring me to evaluate multiple design options and justify decisions based on risk, reliability, and security considerations.<\/p>\n\n\n\n<p><strong>How might I use this skill or insight in the future?<\/strong><br>I will use this approach when assessing network infrastructures, identifying security weaknesses, and recommending improvements in professional cybersecurity environments.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Communication (NACE: Communication)<\/strong><\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/seconomos\/wp-content\/uploads\/sites\/37254\/2026\/02\/Communication-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Communication-1.\"><\/object><a id=\"wp-block-file--media-f0ed420e-a5ba-48dc-9186-f51f0c531cdf\" href=\"https:\/\/sites.wp.odu.edu\/seconomos\/wp-content\/uploads\/sites\/37254\/2026\/02\/Communication-1.pdf\">Communication-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/seconomos\/wp-content\/uploads\/sites\/37254\/2026\/02\/Communication-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f0ed420e-a5ba-48dc-9186-f51f0c531cdf\">Download<\/a><\/div>\n\n\n\n<p><strong>What did I do?<\/strong><br>I wrote a formal memo analyzing legal and ethical issues related to freedom of expression, privacy, and cybersecurity using real-world cases and course concepts.<\/p>\n\n\n\n<p><strong>What did I value about this experience?<\/strong><br>I valued learning how to translate complex legal and cybersecurity topics into clear, organized writing for a non-technical audience.<\/p>\n\n\n\n<p><strong>What lesson did I learn?<\/strong><br>I learned that strong communication is essential in cybersecurity, especially when explaining risks, policies, or legal implications to stakeholders.<\/p>\n\n\n\n<p><strong>How did this experience develop a particular skill or competency?<\/strong><br>This assignment strengthened my written communication skills by emphasizing clarity, structure, and audience awareness.<\/p>\n\n\n\n<p><strong>How might I use this skill or insight in the future?<\/strong><br>I will apply these communication skills when writing security reports, policy documentation, or recommendations for management and compliance teams.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading\">Professionalism &amp; Teamwork (NACE: Professionalism \/ Teamwork)<\/h2>\n\n\n\n<p>During my Captivize internship, I\u2019ve had to stay organized, communicate clearly, and work within confidentiality while still contributing real progress. I value learning how professional teams document decisions and keep work repeatable through clear notes and consistent updates. A key lesson for me is that \u201cgood work\u201d is also <strong>traceable work<\/strong>\u2014someone else should be able to understand what changed and why. I\u2019ll use this skill in cybersecurity roles where documentation, handoffs, and teamwork directly affect security outcomes.<\/p>\n\n\n\n<p><strong>Soft Skills<\/strong><\/p>\n\n\n\n<ul>\n<li>Excellent presentation and communications skills to effectively communicate with management and customers<\/li>\n\n\n\n<li>Ability to clearly articulate complex concepts both written and verbally<\/li>\n\n\n\n<li>Ability, understanding, and usage of active listening skills especially with customers<\/li>\n<\/ul>\n\n\n\n<p><strong>Solid Technical Foundation<\/strong><\/p>\n\n\n\n<ul>\n<li>Understand architecture, administration, and management of operating systems, networking, and virtualization software<\/li>\n\n\n\n<li>General programming\/software development concepts and software analytical skills<\/li>\n\n\n\n<li>Proficiency in programming in Java, C\/C++, disassemblers, and assembly language and &nbsp;programming knowledge of two or more scripting languages (PHP, Python, Perl, or shell)<\/li>\n\n\n\n<li>Understanding of how the different type of firewalls and network load balancers work<\/li>\n\n\n\n<li>Deep understanding of how network routers and switches work<\/li>\n\n\n\n<li>Evaluate and design systems and network architectures<\/li>\n<\/ul>\n\n\n\n<p><strong>Detailed Knowledge of Key Technologies<\/strong><\/p>\n\n\n\n<ul>\n<li>Open Source Applications<\/li>\n\n\n\n<li>Linux Operating Systems<\/li>\n\n\n\n<li>Microsoft Technologies<\/li>\n\n\n\n<li>Wireless Technologies<\/li>\n\n\n\n<li>Database Modeling<\/li>\n\n\n\n<li>Web Application Technologies<\/li>\n\n\n\n<li>Compiled and Interpreted Development Languages<\/li>\n\n\n\n<li>Network Implementation (Operational and Security)<\/li>\n\n\n\n<li>Telephony Technologies (Analog and IP)<\/li>\n\n\n\n<li>Social Engineering<\/li>\n\n\n\n<li>Physical Security<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>What did I do?I completed hands-on Linux system administration tasks that involved identifying storage devices, partitioning disks, creating filesystems, mounting volumes, and verifying system configurations using command-line tools. I also wrote and executed Bash scripts that used conditional logic to automate file and directory checks. What did I value about this experience?I valued working directly&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/seconomos\/skills\/\">Read More<\/a><\/div>\n","protected":false},"author":29797,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/seconomos\/wp-json\/wp\/v2\/pages\/149"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/seconomos\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/seconomos\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/seconomos\/wp-json\/wp\/v2\/users\/29797"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/seconomos\/wp-json\/wp\/v2\/comments?post=149"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/seconomos\/wp-json\/wp\/v2\/pages\/149\/revisions"}],"predecessor-version":[{"id":416,"href":"https:\/\/sites.wp.odu.edu\/seconomos\/wp-json\/wp\/v2\/pages\/149\/revisions\/416"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/seconomos\/wp-json\/wp\/v2\/media?parent=149"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}