{"id":218,"date":"2023-04-02T04:13:14","date_gmt":"2023-04-02T04:13:14","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2023-06-04T20:39:14","modified_gmt":"2023-06-04T20:39:14","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/sgcyber-impact\/skills-2\/","title":{"rendered":"Skills"},"content":{"rendered":"<p><strong>Essential Work Habits<\/strong><\/p>\n<ul>\n<li><span style=\"font-weight: 400\">Ability to work methodically and is very detail oriented<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Eagerness to dig into technical questions and examine them from all sides<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Enthusiastic and highly adaptable<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Strong analytical and diagnostic skills<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Demonstrated skills in innovation and collaboration<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Keep a current understanding of vulnerabilities from the Internet<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Maintaining awareness and knowledge of contemporary standards, practices, procedures and methods<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ability to get the job done<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">The assignment below demonstrates the utilization of all the skills mentioned. It is assignment 5, titled &#8220;Password Cracking,&#8221; from CYSE 301 Cyber Techniques and Operation. Comprising two parts, the assignment initially drew upon my notes. However, the second part required additional time and patience, even after referencing my notes. Recognizing the confusion, I sought external sources for clarification, ultimately enhancing my understanding and enabling successful completion of the assignment.<\/span><\/p>\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/sgcyber-impact\/wp-content\/uploads\/sites\/33058\/2023\/06\/Lab-Report-5-compressed.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Lab-Report-5-compressed.\"><\/object><a id=\"wp-block-file--media-0497e1eb-d270-4bf5-83f2-9e04e57c8717\" href=\"https:\/\/sites.wp.odu.edu\/sgcyber-impact\/wp-content\/uploads\/sites\/33058\/2023\/06\/Lab-Report-5-compressed.pdf\">Lab-Report-5-compressed<\/a><a href=\"https:\/\/sites.wp.odu.edu\/sgcyber-impact\/wp-content\/uploads\/sites\/33058\/2023\/06\/Lab-Report-5-compressed.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-0497e1eb-d270-4bf5-83f2-9e04e57c8717\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Essential Work Habits Ability to work methodically and is very detail oriented Eagerness to dig into technical questions and examine them from all sides Enthusiastic and highly adaptable Strong analytical and diagnostic skills Demonstrated skills in innovation and collaboration Keep a current understanding of vulnerabilities from the Internet Maintaining awareness and knowledge of contemporary standards,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/sgcyber-impact\/skills-2\/\">Read More<\/a><\/div>\n","protected":false},"author":21967,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sgcyber-impact\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sgcyber-impact\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sgcyber-impact\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sgcyber-impact\/wp-json\/wp\/v2\/users\/21967"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sgcyber-impact\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/sgcyber-impact\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":299,"href":"https:\/\/sites.wp.odu.edu\/sgcyber-impact\/wp-json\/wp\/v2\/pages\/218\/revisions\/299"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sgcyber-impact\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}