{"id":193,"date":"2025-11-21T16:40:02","date_gmt":"2025-11-21T16:40:02","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/?page_id=193"},"modified":"2025-11-26T03:30:50","modified_gmt":"2025-11-26T03:30:50","slug":"skill-1-cybersecurity-technical-skills","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/skills-artifacts\/skill-1-cybersecurity-technical-skills\/","title":{"rendered":"Skill 1: Cybersecurity Technical Skills"},"content":{"rendered":"\n<p><strong>Overview<\/strong><br>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cybersecurity requires a strong technical foundation in tools, methodologies, and security assessment techniques. Through hands-on labs, vulnerability analysis, and penetration-testing simulations, I have developed the technical competencies necessary for both defensive and offensive cybersecurity roles. These artifacts demonstrate my ability to confidently navigate industry-standard platforms, conduct threat assessments, and validate vulnerabilities in controlled environments.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Supporting Artifact 1: Nmap Network Enumeration Lab<\/strong><\/h4>\n\n\n\n<p>Description:<br>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 This lab demonstrates my ability to perform network reconnaissance using Nmap to identify open ports, active services, OS fingerprints, and potential attack vectors. Network enumeration is a foundational skill in both penetration testing and network defense, and this artifact highlights my proficiency in assessing internal network exposure and analyzing scan results for security insights.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Supporting Artifact 2: Metasploit Exploit Demonstration<\/strong><\/h4>\n\n\n\n<p>Description:<br>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 In this controlled lab environment, I executed a Metasploit exploit against a known Windows vulnerability. This artifact shows my understanding of exploitation workflows, payload selection, and post-exploitation considerations. Completing this assignment strengthened my ability to validate vulnerabilities safely and reinforced responsible use of offensive security tools.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Supporting Artifact 3: Nessus Vulnerability Scan Report<\/strong><\/h4>\n\n\n\n<p>Description:<br>\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 This report highlights my experience using Nessus, a widely adopted enterprise vulnerability scanner. I performed a full vulnerability assessment, analyzed critical findings, and recommended remediation steps. This artifact demonstrates my ability to interpret scan data, prioritize risks, and communicate actionable security recommendations.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Cybersecurity requires a strong technical foundation in tools, methodologies, and security assessment techniques. Through hands-on labs, vulnerability analysis, and penetration-testing simulations, I have developed the technical competencies necessary for both defensive and offensive cybersecurity roles. These artifacts demonstrate my&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/skills-artifacts\/skill-1-cybersecurity-technical-skills\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":28387,"featured_media":0,"parent":189,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/wp-json\/wp\/v2\/pages\/193"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/wp-json\/wp\/v2\/users\/28387"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/wp-json\/wp\/v2\/comments?post=193"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/wp-json\/wp\/v2\/pages\/193\/revisions"}],"predecessor-version":[{"id":267,"href":"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/wp-json\/wp\/v2\/pages\/193\/revisions\/267"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/wp-json\/wp\/v2\/pages\/189"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sethsantiago-eportfolio\/wp-json\/wp\/v2\/media?parent=193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}