
Alijah Hasan
Welcome Page
Introduction: I have always worked diligently throughout my academic terms. After being accepted to Tidewater Community College (Portsmouth, VA) fall 2020 term, I decided to convert my free time into study time. It was one of the best decisions I have ever made. This extension for studying allowed me to adapt a more desirable and productive way of learning and in conclusion, I have maintained an excellent academic record. I have always been more of a hands-on learner. That is precisely why I chose Cybersecurity as my major. As a young child, observing various incidents involving the aid of first responders, I came to the conclusion there is indeed a requirement for improving technology to be effective, efficient, and stable, after all there are lives at stake. Upon my recruitment within the fire department many of the electronic devices as well as the security of the incident reports were rather obsolete, which is why I provided recommendations and tactics for advanced electronic devices and safety measures for patient records. Education has played a major role in my life, as far as technology I associate myself with various individuals concerning the importance of computers and possibilities of what computers hold for future references within the many aspects of the federal organizations and financial companies. With interactions and discussions as these have provided me experience in developing proper communication with others, it has also assisted me to become a well prudent, and social individual. I plan to make an impact in the cybersecurity world, such as implying advanced security recommendations, mitigating cyber threats, pen testing and more.
How I Was Prepared: My academic background equipped me with foundational knowledge in cybersecurity, and programming which includes network security, python and C++ programming, and risk management. These skills provided a solid foundation for my internship. On-the-job, I honed my skills in practical scenarios, learning to apply various concepts to real-world cybersecurity challenges. I delved into the intricacies of threat modeling, incident analysis, and vulnerability remediation.
Why I Chose The Internship: I felt the company was aligned with my future goals and I did also gain invaluable skills that will help me in the future. It is clear that there was a wealth of experience in the company that provides strong work values and ethics. I needed to utilize my time wisely during my internship and gain as much as I possibly could. One of the main reasons for undertaking this internship was me being eager to develop the necessary work skills and values to excel within my career path. I am confident that interning at Longbow LLC allowed me to develop those skills and values. Embarking on an internship in the dynamic field of cybersecurity was a deliberate choice driven by my passion for safeguarding digital assets and contributing to the evolving landscape of online security.
Time During The Internship: After the completion of a hundred hours of the internship within longbow, various tasks were completed as well as given to me. A meeting was ordered to take place due to certain updates, future references, and vital individuals’ appearances. The data protection plan was presented during the meeting for further instructions as well as improvements. Upon reviewing the document the Wagner group provided various details from their past experience when dealing with protection plans, and it seemed they were rather intrigued. In fact the document was developed so well that they even considered presenting it to the Federal Aviation Administration (FAA). Thankfully with the assistance of my colleagues, we were able to successfully complete the assignment. Soon after the meeting had ended new agendas had arisen. Now understanding how to properly conduct the provided tasks as well as meeting the requirements, a rather interesting project had been initiated. Being that various UAV tests are taken near the premises of the area of operation as well as the Langley runway not being too much of a distance away with plenty of airway traffic, miniature AI devices were purchased to identify and detect objects. These devices are considered to be a dominant tool when operating drones, robots, autonomous machines and more. The new task given to me was to train the device to detect and identify flying objects for further intel of monitoring aircraft and further security purposes. However, with such a miniscule amount of research as well as time spent in dealing with any AI technology, proved to be a rather arduous errand.
More Time Spent At The Internship: Upon 200 hours of completion, the task to program the Jetson nano developer board to identify and detect motor vehicle traffic and individuals on a live stream was a success. From what I gathered after modifying the program, the machine would output the object’s identification as well as the percentage of the accuracy of the object. For example, when a vehicle is passing by or directing the camera at a vehicle parked the device reads (CAR 89-97%) and these percentages vary on the angle, and range of the car as well as the weather conditions. Another great detail is that you can even have recordings and take snap photos, so if you required to analyze or evaluate the object you have that option. After the completion of the task, I presented the work to my boss and was satisfied with the results. Being that the task results were greatly appreciated I was given another assignment quite similar to the previous one, in fact it was actually to program more of the same devices and see if there could be more improvements. However, before I initiated the task, one of my colleagues asked if I could provide assistance in installing servers and activating them. Due to our systems being rather outdated, new servers were purchased, with this occurring an additional charge was given to me. And that was to ensure safe procedures were conducted to install the servers as well as demonstrating my skills with various linux commands.
The Motivating and Exciting Aspects Of The Internship: The internship at Longbow LLC was marked by several motivating and exciting aspects that not only fueled my enthusiasm for the field of cybersecurity but also contributed significantly to my personal and professional growth. One of the most motivating aspects of the internship was the opportunity to witness the real-world impact of my work. Actively contributing to the identification and mitigation of cybersecurity threats meant that every task had a direct effect on the organization’s security posture. Knowing that my efforts played a role in safeguarding critical assets and data was not only fulfilling but also provided a 8-sense of purpose and responsibility. Engaging in hands-on projects allowed me to apply years worth of knowledge and dedication acquired during my academic journey to practical scenarios. The ability to see concepts in action and the immediate feedback from solving complex problems reinforced my confidence in my skills. The collaborative and team-oriented culture at Longbow LLC. was a constant source of motivation. Working alongside experienced professionals and engaging in knowledge-sharing sessions created a supportive and dynamic work environment. The mentorship model, where I had a dedicated mentor guiding me through challenges, fostered a sense of camaraderie and accelerated my learning curve. The collective effort towards addressing cybersecurity challenges enhanced the overall excitement of the internship. The diversity of projects provided a constant stream of new challenges and learning opportunities. From conducting developing cyber strategies to programming AI, each project presented a unique set of problems to solve. This variety not only kept the work engaging but also broadened my skill set, allowed me to explore different facets of cybersecurity. The exposure to diverse projects was instrumental in expanding my knowledge and expertise. The ever-evolving nature of cybersecurity ensured that there was always room for continuous learning. Staying updated on the latest threats, technologies, and industry best practices was not just encouraged but integral to the internship. The dynamic nature of the work kept each day intellectually stimulating and reinforced the importance of staying informed in a rapidly changing field. Experiencing professional growth through the internship was a significant motivating factor. Overcoming challenges, mastering new skills, and contributing to the success of the organization provided a sense of achievement. The internship served as a catalyst for my growth as a cybersecurity professional, instilling confidence and preparing me for future challenges in the industry.
Conclusion: In conclusion, my internship at Longbow LLC. provided valuable insights into the world of cybersecurity. The hands-on nature of the internship allowed me to apply theoretical knowledge in real-world scenarios, enhancing my understanding of cybersecurity concepts. The hands-on experience also complimented my academic learning, shaping my understanding of the field and preparing me for future challenges. Seeing the direct impact of my contributions on the organization’s security posture instilled a sense of responsibility and accomplishment. Dealing with diverse projects and the dynamic nature of cybersecurity enhanced my adaptability and problem-solving skills. Exposure to various facets of cybersecurity and the mentorship model contributed significantly to my professional growth and confidence in the field. The practical experiences gained during the internship will inform my course selection, allowing me to focus on areas that align with my newfound interests and strengths within cybersecurity. The real-world scenarios encountered during the internship will add depth and context to my classroom learning, making academic concepts more tangible and relevant. Connections made during the internship will be leveraged for networking opportunities, potentially leading to collaborations on academic projects or participation in industry-related events. The internship at Longbow LLC. has been a transformative experience that has left me with invaluable insights and skills. The collaborative work environment emphasized the significance of teamwork in addressing complex cybersecurity challenges and fostered a culture of continuous learning. internship will inform my course selection, allowing me to focus on areas that align with my newfound interests and strengths within cybersecurity. The real-world scenarios encountered during the internship will add depth and context to my classroom learning, making academic concepts more tangible and relevant.

Skills and Artifacts
Work Experience: My major work duties were diverse, reflecting the multifaceted nature of technology as a whole. I was involved in conducting vulnerability assessments, analyzing threat intelligence data, contributing to the development of cybersecurity policies, and AI training. Notable projects included the implementation of advanced python programming, outlining strategies, and more. I contributed to the development and enhancement of cybersecurity policies within the organization. This included collaborating with the legal and compliance teams to ensure alignment with industry standards and regulatory requirements. Skills 1 – the role of overseeing LANs security, providing cybersecurity risk management as well as AI machine learning was given to me. A technological contractor group was properly introduced to us and are aiding our familiarity involving severs, they are also our go-to individuals for any updates as well as information. Being that this was our first impression The first objective was to create a data protection plan, considering that the company was rather lacking in updates. After a fairly short amount of time reading documents and various policies, I sprung into action developing guidelines to a robust and professional system. It consists of various approaches for unfortunate events, how to conduct computational tasks utilizing Confidentiality, Integrity, and Availability (C.I.A), Avoiding mishaps, potential cyber traps and miscommunication. Skills 2 – programming a Nvidia Jetson nano board to identify and detect objects at a great distance as well as organize the data collected by the device. By doing so I required an open cv to run codes from the IDE to the terminal, for several days I indeed struggled as technology can prove to be difficult to deal with, plus that was my first time ever programming something in the field. However, I was able to make the device identify and detect objects but only at such a distance, being that I am stationed on the twelfth floor, the windows are not cleansed too often, and the camera resolution is not the best quality. Skills 3 – Afterwards I was assigned to provide assistance in creating a program to collect the data received by the drones and output various graphs of the battery consumption, altitude deviance, temperature of the battery, and more.
Personal Research: Skills 1 – Personal research often involved hands-on experimentation with cybersecurity tools and techniques. Whether it’s setting up a virtual lab, conducting penetration testing, or analyzing malware samples, practical experience deepens one’s understanding of cybersecurity concepts and strengthens their skills in threat detection and incident response. Skills 2 – Researching cybersecurity frameworks like NIST Cybersecurity Framework, ISO 27001, and CIS Controls provided me a structured approach to understanding cybersecurity best practices. Becoming familiarized with these frameworks, individuals can assess their organization’s security posture, identify areas for improvement, and implement effective security measures. Skills 3 – Researching cybersecurity provided me to understand how to analyze complex problems, identify vulnerabilities, and devise effective solutions. Whether it’s troubleshooting network issues, mitigating security breaches, or developing secure coding practices, personal research fosters critical thinking and problem-solving skills essential for addressing cybersecurity threats.
College Education: Skills 1 – Ethical hacking courses often included practical, hands-on lab exercises where I could apply theoretical knowledge in real-world scenarios. These exercises may involve penetration testing, vulnerability assessment, malware analysis, and network reconnaissance. By engaging in practical activities, I developed technical skills and gain valuable experience in cybersecurity tools and techniques. Skills 2 – Risk management courses provided me with insights into various risk mitigation techniques and strategies. Students learn how to implement security controls and countermeasures to reduce the likelihood and impact of cyber threats. This includes measures such as access controls, encryption, intrusion detection systems, and security policies and procedures. Skills 3 – In addition to other courses we also covered strategies for protecting against cyber threats. I learned about security controls, best practices, and security architectures designed to safeguard systems and networks from unauthorized access, data breaches, and other security incidents.

Resume
Alijah Hasan Target: Cybersecurity Qualified to effectively self-manage during independent projects, as well as collaborate as a part of a productive team. | Chesapeake, VA 23321(347) 813-6394 alijah.hasan@aol.com linkedin.com/in/alijah-hasan-4938a3235 |
EDUCATION Tidewater Community CollegePortsmouth, Virginia 2020-2022 Associates of Computer Science Old Dominion University Norfolk, Virginia 2022 – 2024 Bachelor Degree of Cybersecurity EXPERIENCE ExxonMobil Petroleum Hampton, VA Assistant Manager 2017-2020 Administered operational and logistic support, maintained inventory, and evaluated employee performance. VOLUNTEER Community Emergency Response Team Chesapeake, Virginia 2020 Carrollton Volunteer Fire Department Carrollton, Virginia 2022 – Current | SKILLS Proficient in Microsoft Word OS, Powerpoint OS, Google Drive, Programming in C++, linux commands, Ethical Hacking, Information Assurance for Cybersecurity, Digital Forensics, Risk management. Knowledge of the concept cybersecurity Ability to meet high productivity standards and work with minimal supervision. Known as a team player, multitasker, and self-starter, observant, steadily strives to exceed expectations. AWARDS -Phi Theta Kappa Honor Society Member-Dean’s Honors -President’s Honor Roll -Community Engagement Award Certifications and Training -Cisco Networking Academy® Introduction to Cybersecurity |

Reflection paper
This reflective essay will demonstrate the process of creating my e-portfolio and choosing the best artifacts while collecting current material for this class to be displayed. I was unsure if I had the capabilities to pull work from other classes that showed moments where I have plugged in every sense of knowledge to be successful. However I believe this portfolio has aided me to do just that. When I started out on the portfolio, I begin to build confidence as I search through older work that I have accomplished because at one point I shocked myself on my improvement which I did not notice until I started collecting artifact. I believe through my trials did not just construct me to becoming more of a comprehensive individual but also aware. This e-portfolio it will display exactly what skills and artifacts I will provide to show my progression throughout my education that makes me a great leader. I will be discussing the main topics in the class that helped me create this portfolio, which is collecting, skills, critical thinking and the definition of a e-portfolio.
In this class since it was mainly discussions on portfolio process and meaning, it provided several examples on how different people are and their strengths and experience is what makes them different from others which also attracts employers. I learned what artifacts are and the importance of keeping your work organized. I also learned that things I am proud of need to be in a separate folder, so I cannot just show great work but also strides that it took to accomplish an assignment. It is not always about what I received as a grade but also what I learned as I was completing the work as well. I read teacher responses and my responses whether it was to essay requirements or discussions and feel confident of what I submitted.
The main theme in this class is creating a portfolio that shows personality but also struggles to the journey of accomplishments. This is not to just show the best work but the work that I am most proud of whether that is in education, internships, and even work experience. It’s a true self reflection of late nights staying up and putting forth the effort to be where I am today. I realized that the portfolio also shows a side of expression. It pulls out creative, organized and attractive things about a person to build courage. No portfolio should be the same because each walk of life that an individual experiences will be different based on courses taken and interest in life. I have created my portfolio in a friendly, easy to maneuver way so that it will not cause confusion as it is being viewed by those that know nothing about me or the courses I have taken.
In the readings of various of modules it mentioned the audience as the target of how we need to choose what needs to be displayed and how. A quote they used that was eye catching that guided my work was, “A good rule of thumb with e-portfolios is that readers should be able to get to anyplace in your work from anyplace in your work.” In other words when collecting your work, it needs to be strategic and well planned before just uploading any documents that show progress. The layout should be selected for display purposes and then from there the tabs need to be well organized so that it makes sense for each skill chosen. My thoughts initially were that I didn’t have anything to display for the classes I took until I went through all my assignments and looked over my past work. The items that I collected where things that impressed myself and made me ask myself “did I write this?” It becomes rewarding and should be shown as progress when making a selection.
in the IDS300W class displaying the various process models demonstrated thought processes visually by creating PowerPoints with scenery and workshops for the breakdown of ideas on paper. It helped me concur brainstorming and was the most difficult for me since I never know where to start when it comes to writing or pinpointing important information. I had to choose three different disciplines that related to my chosen topic that all worked together with their own twist of perspective where it is similar but said differently. This is a great skill to have when it comes to critical thinking because you have to not be in your own brain but learn how to understand others with different 5 disciplines. Just because my major is Cybersecurity that should not limit me only to that but give me the perspective of how other majors think when it comes to topics. This skill formed me to being a team player but also understanding how others think.
This course allowed me to think out of the box and see what is needed to help others and make life easier by being creative and brainstorming in a wide range instead of minimizing my thoughts. This class was rather simple and creative due to providing how I could possibly utilized an E-portfolio for future references as well as embracing self reflection of trials, mistakes, success, and so on and so forth.
The IDS300W course often involved input from multiple fields such as computer science, psychology, law, ethics, and sociology. By exploring social engineering attacks through various lenses, I gained insights into the complex interplay of technological, human, legal, and societal factors that influence social engineering attacks risks and defenses. The class fostered critical thinking skills by encouraging us to analyze our topics issues from different angles and evaluate diverse viewpoints. This approach helped me develop a deeper understanding of the underlying principles and challenges in cybersecurity and enables them to think creatively when solving complex problems. Social engineering attacks involve ethical dilemmas and considerations, such as privacy rights, data protection, and the ethical use of technology. The Interdisciplinary course included plenty of discussions on ethical frameworks, moral reasoning, and professional codes of conduct in the context of my topic. I learned to recognize and address ethical issues in social engineering attacks caution, research, and policy-making. Effective communication is essential in cybersecurity, whether it’s conveying technical concepts to non-technical stakeholders, presenting findings to decision-makers, or collaborating with interdisciplinary students. The class emphasized communication skills, including written and oral communication, presentation skills, and the ability to tailor messages to different audiences. The topic I chose was multifaceted and dynamic, requiring creative significant prevention and awareness. The course exposed myself to real-world scenarios and case studies that integrate technical, legal, ethical, and social dimensions. By applying knowledge from various disciplines, I learned to identify root causes, anticipate consequences, and develop innovative solutions to social engineering attacks problems. Preventing social engineering attacks is a collaborative endeavor that involves teamwork across different disciplines and organizational roles. IDS300W often incorporated presentations, projects, discussions, and simulations that require students to work together to address the topic’s challenges. Through collaboration, I learned to leverage diverse skills, perspectives, and expertise to achieve common goals in cybersecurity practice and research. Cybersecurity is a rapidly evolving field, with new threats, technologies, and regulations emerging constantly. Interdisciplinary courses cultivate adaptability and a lifelong learning mindset by exposing students to diverse topics, methodologies, and approaches in cybersecurity. I obtained knowledge to stay informed about industry developments, acquire new skills independently, and adapt to changing cybersecurity landscapes throughout their careers.
The audience of a portfolio should always be in mind when collecting information to be displayed to others. It is important to make sure that it is attractive but also professional so it can be used for education but also for potential employers. Having a portfolio makes resumes more appealing and intriguing to learn more than just job history but the growth of an individual. With taking IDS493 class I learned more than I could about myself than the subject because that is what a portfolio does. It shows progression and course work that has been accomplished and improved me as a person. Improvement for this course is key and also self-reflection on success is the main priority

Cited Sources
Nelson Duarte, Nuno Coelho & Teresa Guarda, Social Engineering: The Art of Attacks.
https://link.springer.com/chapter/10.1007/978-3-030-90241-4_36
Francois Mouton, Social Engineering Attack Detection Model
http://hdl.handle.net/2263/70235, https://repository.up.ac.za/bitstream/handle/2263/70235/Mouton_Social_2018.pdf?sequence=1&isAllowed=y
Ivaturi, Koteswara and Janczewski, A Typology of Social Engineering Attacks
https://researchspace.auckland.ac.nz/bitstream/handle/2292/24071/whole.pdf?sequence=2&isAllowed=y, https://researchspace.auckland.ac.nz/handle/2292/24071
Vian Smit, A study and analysis of human behaviour influence on cybersecurity. A human behaviourist approach to mitigate social engineering attacks
https://scholar.sun.ac.za/server/api/core/bitstreams/511c1680-7257-4882-a4d7-e9b0b9345185/content
Valerie Seinstra, Information security awareness training to combat social engineering attacks: A Meta-Analysis
https://essay.utwente.nl/95852/1/Seinstra_BA_EEMCS.pdf, https://essay.utwente.nl/95852/
Leave a Reply