{"id":20,"date":"2025-08-28T00:35:45","date_gmt":"2025-08-28T00:35:45","guid":{"rendered":"https:\/\/student.wp.odu.edu\/aabou004\/?page_id=20"},"modified":"2025-12-16T14:43:46","modified_gmt":"2025-12-16T14:43:46","slug":"relevant-courses-and-experience","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/aabou004\/relevant-courses-and-experience\/","title":{"rendered":"Relevant Courses and Experience"},"content":{"rendered":"\n<h6 class=\"wp-block-heading\">ITS &#8211; Help Desk Employee <\/h6>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/09\/image-2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"461\" src=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/09\/image-2-1024x461.png\" alt=\"\" class=\"wp-image-63\" srcset=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/09\/image-2-1024x461.png 1024w, https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/09\/image-2-300x135.png 300w, https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/09\/image-2-768x346.png 768w, https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/09\/image-2-1536x691.png 1536w, https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/09\/image-2.png 2000w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<p><sub>Information Technology Services &#8211; Monarch Hall 1100<\/sub><\/p>\n\n\n\n<p>As a member of the on-campus IT Help Desk team, I provide technical support to students, faculty, and staff, helping to resolve a wide range of hardware, software, and networking issues. This role has sharpened my problem-solving abilities, strengthened my communication skills, and deepened my understanding of real-world IT support operations.<\/p>\n\n\n\n<pre class=\"wp-block-preformatted\">\u2022 Solved tech issues like Wi-Fi, logins, and software issues\n\u2022 Recorded support requests using a ticketing system\n\u2022 Provided support in person, by phone, and through email<\/pre>\n\n\n\n<p><\/p>\n\n\n\n<h6 class=\"wp-block-heading\"><strong>CYSE 368<\/strong>&nbsp;&nbsp;<strong>CYBERSECURITY <\/strong>Clinic<strong> INTERNSHIP <\/strong><\/h6>\n\n\n\n<p>The Cybersecurity Internship Clinic at ODU is a 15-week, in-person experiential learning program where students work as cybersecurity consultants for small businesses and local government organizations. The program targets organizations that lack dedicated cybersecurity resources, providing hands-on opportunities to assess risks, design security policies, conduct employee training, perform SWOT analyses, and deliver practical risk management solutions. The clinic combines technical training, design thinking, and real-world consulting experience. Working in teams with industry partners, to apply skills to real clients under faculty supervision. Throughout the program, students develop technical, analytical, communication, and professional consulting skills while delivering meaningful services to community organizations.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/12\/Individual-Reflection.pdf\" type=\"application\/pdf\" style=\"width:100%;height:590px\" aria-label=\"Embed of Individual-Reflection.\"><\/object><a id=\"wp-block-file--media-f43fc770-1253-4243-9b48-5521479c38f6\" href=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/12\/Individual-Reflection.pdf\">Individual-Reflection<\/a><a href=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/12\/Individual-Reflection.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f43fc770-1253-4243-9b48-5521479c38f6\"><\/a><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/12\/EVC-Executive-Team-Reflection.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of EVC-Team-Reflection.\"><\/object><a id=\"wp-block-file--media-a4a0d0df-83de-4f68-af5f-ce8300351a5b\" href=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/12\/EVC-Executive-Team-Reflection.pdf\">EVC-Team-Reflection<\/a><a href=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/12\/EVC-Executive-Team-Reflection.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-a4a0d0df-83de-4f68-af5f-ce8300351a5b\"><\/a><\/div>\n\n\n\n<p><\/p>\n\n\n\n<h5 class=\"wp-block-heading\">INDIVIDUAL REFLECTIONS FOR CYSE 368 Internship<\/h5>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/12\/Reflection1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Reflection1.\"><\/object><a id=\"wp-block-file--media-179d2009-8e8d-4078-895e-56586e51b0d7\" href=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/12\/Reflection1.pdf\">Reflection1<\/a><a href=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/12\/Reflection1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-179d2009-8e8d-4078-895e-56586e51b0d7\"><\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/12\/Reflection2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Reflection2.\"><\/object><a id=\"wp-block-file--media-686087dc-3f09-4998-b4de-08732bed590f\" href=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/12\/Reflection2.pdf\">Reflection2<\/a><a href=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/12\/Reflection2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-686087dc-3f09-4998-b4de-08732bed590f\"><\/a><\/div>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/12\/Reflection3.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Reflection3.\"><\/object><a id=\"wp-block-file--media-b69fd36b-53ca-4e0e-9491-da4ca300e1a0\" href=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/12\/Reflection3.pdf\">Reflection3<\/a><a href=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/12\/Reflection3.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-b69fd36b-53ca-4e0e-9491-da4ca300e1a0\">Download<\/a><\/div>\n\n\n\n<h6 class=\"wp-block-heading\"><strong>CYSE 301<\/strong>&nbsp;&nbsp;<strong>Cybersecurity Techniques and Operations<\/strong>&nbsp;<\/h6>\n\n\n\n<p>This course introduces tools and techniques used to secure and analyze large computer networks and systems. Students will explore and map networks using a variety of diagnostic software tools, learn advanced packet analysis, configure firewalls, write intrusion detection rules, perform forensic investigation, and practice techniques for penetration testing. This is proven with one of my projects that shown expertise in Red team specialist hacking into an older windows system.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/09\/Assignment4-compressed-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Ethical Hacking.\"><\/object><a id=\"wp-block-file--media-7ac54578-84b3-485e-9242-adae11966d1c\" href=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/09\/Assignment4-compressed-1.pdf\">Ethical Hacking<\/a><a href=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/09\/Assignment4-compressed-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-7ac54578-84b3-485e-9242-adae11966d1c\"><\/a><\/div>\n\n\n\n<p><\/p>\n\n\n\n<h6 class=\"wp-block-heading\">CYSE 425W Cybersecurity Strategy and Policy<\/h6>\n\n\n\n<p>This writing intensive course explores cybersecurity policy and strategy and introduces students to the essentials of strategy development and policy making in cybersecurity. Topics considered include planning principles in cyber strategy; risk management and cybersecurity policy; the connections between cybersecurity policies, businesses, and governmental institutions; the knowledge, skills, and abilities needed to develop and implement cybersecurity policy; the social, political and ethical implications that arise in cybersecurity policies and strategies; strategies to assess cybersecurity policy; and the ties between national security and cybersecurity policy. There will be an assignment showing my thorough understanding of the class with policy engagement.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/09\/Policy-Analysis-Paper-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Policy Analysis Paper.\"><\/object><a id=\"wp-block-file--media-ca344898-a14f-486c-9822-ad99d906e847\" href=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/09\/Policy-Analysis-Paper-1.pdf\">Policy Analysis Paper<\/a><a href=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/09\/Policy-Analysis-Paper-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-ca344898-a14f-486c-9822-ad99d906e847\"><\/a><\/div>\n\n\n\n<h6 class=\"wp-block-heading\"><strong>CYSE 280<\/strong>&nbsp;&nbsp;<strong>Windows System Management and Security<\/strong><\/h6>\n\n\n\n<p>This course introduces tools and techniques used to configure, manage and implement Windows and its security-related features. Students will install, configure, manage and secure Windows client &amp; server operating systems and related networking environment using a variety of software tools. This course also details how to mitigate malware threats, identify security issues by using auditing and the Advanced Threat Analysis feature in Windows Server, secure virtualization platform, and use new deployment options for enhancing the security. The work I will provide will be a essay policy research paper on the history of Windows Systems.<br><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/09\/Project-Paper.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Project.\"><\/object><a id=\"wp-block-file--media-b540567a-0990-44d6-8c6c-b1fab6bf6a0f\" href=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/09\/Project-Paper.pdf\">Project<\/a><a href=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/09\/Project-Paper.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-b540567a-0990-44d6-8c6c-b1fab6bf6a0f\"><\/a><\/div>\n\n\n\n<p><\/p>\n\n\n\n<h6 class=\"wp-block-heading\">CYSE\/POLS 426 Cyber War<\/h6>\n\n\n\n<p>This course explores the national security dimensions of cybersecurity and examines cyber war in international relations. Exploration of cyber war begins with an examination of cybersecurity as a component of national security and investigates the topics of U.S National Cybersecurity and other national approaches to cyber war. The topics of cyber deterrence, cyber as a military domain, the roles of international organizations in cyber war, cyber terrorism, the role of social media, and information warfare will be discussed. The international dimension of cybersecurity is also discussed. I have attached an essay about recent cyber war news information to show my understanding of the class.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/09\/Cyber-War-Project-Paper.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Cyber War Project.\"><\/object><a id=\"wp-block-file--media-79489788-010b-4376-8dd5-15b93499b2cb\" href=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/09\/Cyber-War-Project-Paper.pdf\">Cyber War Project<\/a><a href=\"https:\/\/student.wp.odu.edu\/aabou004\/wp-content\/uploads\/sites\/39320\/2025\/09\/Cyber-War-Project-Paper.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-79489788-010b-4376-8dd5-15b93499b2cb\"><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>ITS &#8211; Help Desk Employee Information Technology Services &#8211; Monarch Hall 1100 As a member of the on-campus IT Help Desk team, I provide technical support to students, faculty, and staff, helping to resolve a wide range of hardware, software, and networking issues. This role has sharpened my problem-solving abilities, strengthened my communication skills, and &hellip; <a href=\"https:\/\/student.wp.odu.edu\/aabou004\/relevant-courses-and-experience\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Relevant Courses and Experience<\/span><\/a><\/p>\n","protected":false},"author":31215,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/aabou004\/wp-json\/wp\/v2\/pages\/20"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/aabou004\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/aabou004\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/aabou004\/wp-json\/wp\/v2\/users\/31215"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/aabou004\/wp-json\/wp\/v2\/comments?post=20"}],"version-history":[{"count":5,"href":"https:\/\/student.wp.odu.edu\/aabou004\/wp-json\/wp\/v2\/pages\/20\/revisions"}],"predecessor-version":[{"id":93,"href":"https:\/\/student.wp.odu.edu\/aabou004\/wp-json\/wp\/v2\/pages\/20\/revisions\/93"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/aabou004\/wp-json\/wp\/v2\/media?parent=20"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}