{"id":218,"date":"2025-02-15T02:40:58","date_gmt":"2025-02-15T02:40:58","guid":{"rendered":"https:\/\/wp.odu.edu\/cyberimpact-template\/?page_id=218"},"modified":"2025-09-06T22:41:37","modified_gmt":"2025-09-06T22:41:37","slug":"skills-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/sgros\/skills-2\/","title":{"rendered":"Skills &amp; Competencies"},"content":{"rendered":"\n<p><strong>Competencies<\/strong><\/p>\n\n\n\n<p>-An understanding of foundational cybersecurity concepts such as the CIA triad<\/p>\n\n\n\n<p>-Conceptual knowledge of the relationship between vulnerabilities, threats, exposures, and countermeasures<\/p>\n\n\n\n<p>-I understood the differences between Identification, Authentication and Authorization, as well as the importance of Role-Based Authorization<br>-I received a primer of how encryption works, and it\u2019s role in Public Key Infrastructure<br>-I developed an understanding of \u201cDefense-in-Depth\u201d &#8211; the Onion Layered approach to cybersecurity<\/p>\n\n\n\n<p>-I am familiar with several fundamental threats and technologies used to mitigate those threats<\/p>\n\n\n\n<p>-I am familiar with additional security related concepts such as Man-in-the-middle attacks, DNS, SQL Injection, Supply Chain Attacks and others<\/p>\n\n\n\n<p>-I am aware of several measures enterprises use to safeguard data, systems and detect threats<\/p>\n\n\n\n<p><strong>Completed Courses<\/strong><\/p>\n\n\n\n<p>CYSE 200T &#8211; Cybersecurity, Technology, and Society<br>CYSE 250 &#8211; Basic Cybersecurity Programming and Networking<br>CYSE 300 &#8211; Introduction to Cybersecurity<br>CYSE 270 &#8211; Linux Systems for Cybersecurity<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Competencies -An understanding of foundational cybersecurity concepts such as the CIA triad -Conceptual knowledge of the relationship between vulnerabilities, threats, exposures, and countermeasures -I understood the differences between Identification, Authentication and Authorization, as well as the importance of Role-Based Authorization-I received a primer of how encryption works, and it\u2019s role in Public Key Infrastructure-I developed&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/sgros\/skills-2\/\">Read More<\/a><\/div>\n","protected":false},"author":30648,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/sgros\/wp-json\/wp\/v2\/pages\/218"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/sgros\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/sgros\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sgros\/wp-json\/wp\/v2\/users\/30648"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/sgros\/wp-json\/wp\/v2\/comments?post=218"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/sgros\/wp-json\/wp\/v2\/pages\/218\/revisions"}],"predecessor-version":[{"id":327,"href":"https:\/\/sites.wp.odu.edu\/sgros\/wp-json\/wp\/v2\/pages\/218\/revisions\/327"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/sgros\/wp-json\/wp\/v2\/media?parent=218"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}