{"id":155,"date":"2025-09-25T12:59:01","date_gmt":"2025-09-25T12:59:01","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=155"},"modified":"2025-12-04T00:41:58","modified_gmt":"2025-12-04T00:41:58","slug":"experience","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/travoncleveland\/experience\/","title":{"rendered":"Experience"},"content":{"rendered":"\n<p><strong>CYSE 200T \u2013 Introduction to Cybersecurity<\/strong>: Gained a broad understanding of cybersecurity concepts, ethical challenges, and the social impact of technology on individuals and organizations.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/travoncleveland\/wp-content\/uploads\/sites\/39925\/2025\/12\/annotated-AI20-20to20with20Cybersecurity.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-AI20-20to20with20Cybersecurity<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/travoncleveland\/wp-content\/uploads\/sites\/39925\/2025\/12\/Untitled-document.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Untitled-document<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/travoncleveland\/wp-content\/uploads\/sites\/39925\/2025\/12\/annotated-CYSE-20020CIA20and20vs.20Authorization.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-CYSE-20020CIA20and20vs.20Authorization<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><strong>CYSE 300 \u2013 Cybersecurity Techniques and Tools:<\/strong> Exposure to penetration testing basics, vulnerability scanning, and defensive measures.<\/p>\n\n\n\n<p>CRJS 405 \u2013 Law and Ethics in Criminal Justice: Explored how ethical frameworks and legal structures apply to cybersecurity.<\/p>\n\n\n\n<p>ECE 416 \u2013 Network Engineering: Built understanding of protocols, routing, and how networks are secured at different layers.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Labs &amp; Projects<\/strong><\/h3>\n\n\n\n<p>Hands-on practice that connects directly to classroom learning and certification prep:<\/p>\n\n\n\n<ul>\n<li>Built a <strong>home lab<\/strong> using my NAS server, Sonarr\/Radarr, and VPN configuration to practice secure networking.<\/li>\n\n\n\n<li>Completed <strong>packet analysis labs<\/strong> using Wireshark to study traffic patterns and identify suspicious activity.<\/li>\n\n\n\n<li>Practiced <strong>system hardening<\/strong> and vulnerability remediation as part of Security+ preparation.<\/li>\n\n\n\n<li>Documented incidents and responses for simulated SOC exercises.<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Skills I\u2019m Building<\/strong><\/h3>\n\n\n\n<p>Key technical and professional skills I am actively developing:<\/p>\n\n\n\n<ul>\n<li><strong>Technical Tools<\/strong>: Linux command line, Wireshark, Splunk, Python basics.<\/li>\n\n\n\n<li><strong>Cybersecurity Knowledge<\/strong>: Threat intelligence, vulnerability management, risk assessment.<\/li>\n\n\n\n<li><strong>Professional Skills<\/strong>: Technical writing, teamwork, and problem-solving from my Navy background.<\/li>\n\n\n\n<li><strong>Certifications<\/strong>: Actively preparing for <strong>CompTIA Security+<\/strong>, with CySA+\/CEH in my future roadmap.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CYSE 200T \u2013 Introduction to Cybersecurity: Gained a broad understanding of cybersecurity concepts, ethical challenges, and the social impact of technology on individuals and organizations. CYSE 300 \u2013 Cybersecurity Techniques and Tools: Exposure to penetration testing basics, vulnerability scanning, and defensive measures. CRJS 405 \u2013 Law and Ethics in Criminal Justice: Explored how ethical frameworks&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/travoncleveland\/experience\/\">Read More<\/a><\/div>\n","protected":false},"author":31571,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/travoncleveland\/wp-json\/wp\/v2\/pages\/155"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/travoncleveland\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/travoncleveland\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/travoncleveland\/wp-json\/wp\/v2\/users\/31571"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/travoncleveland\/wp-json\/wp\/v2\/comments?post=155"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/travoncleveland\/wp-json\/wp\/v2\/pages\/155\/revisions"}],"predecessor-version":[{"id":326,"href":"https:\/\/sites.wp.odu.edu\/travoncleveland\/wp-json\/wp\/v2\/pages\/155\/revisions\/326"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/travoncleveland\/wp-json\/wp\/v2\/media?parent=155"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}