ITS – Help Desk Employee

Information Technology Services – Monarch Hall 1100
As a member of the on-campus IT Help Desk team, I provide technical support to students, faculty, and staff, helping to resolve a wide range of hardware, software, and networking issues. This role has sharpened my problem-solving abilities, strengthened my communication skills, and deepened my understanding of real-world IT support operations.
• Solved tech issues like Wi-Fi, logins, and software issues • Recorded support requests using a ticketing system • Provided support in person, by phone, and through email
CYSE 301 Cybersecurity Techniques and Operations
This course introduces tools and techniques used to secure and analyze large computer networks and systems. Students will explore and map networks using a variety of diagnostic software tools, learn advanced packet analysis, configure firewalls, write intrusion detection rules, perform forensic investigation, and practice techniques for penetration testing. This is proven with one of my projects that shown expertise in Red team specialist hacking into an older windows system.
CYSE 425W Cybersecurity Strategy and Policy
This writing intensive course explores cybersecurity policy and strategy and introduces students to the essentials of strategy development and policy making in cybersecurity. Topics considered include planning principles in cyber strategy; risk management and cybersecurity policy; the connections between cybersecurity policies, businesses, and governmental institutions; the knowledge, skills, and abilities needed to develop and implement cybersecurity policy; the social, political and ethical implications that arise in cybersecurity policies and strategies; strategies to assess cybersecurity policy; and the ties between national security and cybersecurity policy. There will be an assignment showing my thorough understanding of the class with policy engagement.
CYSE 280 Windows System Management and Security
This course introduces tools and techniques used to configure, manage and implement Windows and its security-related features. Students will install, configure, manage and secure Windows client & server operating systems and related networking environment using a variety of software tools. This course also details how to mitigate malware threats, identify security issues by using auditing and the Advanced Threat Analysis feature in Windows Server, secure virtualization platform, and use new deployment options for enhancing the security. The work I will provide will be a essay policy research paper on the history of Windows Systems.
CYSE/POLS 426 Cyber War
This course explores the national security dimensions of cybersecurity and examines cyber war in international relations. Exploration of cyber war begins with an examination of cybersecurity as a component of national security and investigates the topics of U.S National Cybersecurity and other national approaches to cyber war. The topics of cyber deterrence, cyber as a military domain, the roles of international organizations in cyber war, cyber terrorism, the role of social media, and information warfare will be discussed. The international dimension of cybersecurity is also discussed. I have attached an essay about recent cyber war news information to show my understanding of the class.