{"id":37,"date":"2025-11-25T03:13:55","date_gmt":"2025-11-25T03:13:55","guid":{"rendered":"https:\/\/student.wp.odu.edu\/amarc013\/?page_id=37"},"modified":"2025-12-06T01:18:08","modified_gmt":"2025-12-06T01:18:08","slug":"skill-1-cybersecurity-skills","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/amarc013\/skill-1-cybersecurity-skills\/","title":{"rendered":"Skill 1 &#8211; Cybersecurity Skills"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\"><strong>Artifact 1: Network Enumeration and Security Analysis Lab<\/strong><\/h3>\n\n\n\n<p>I completed a hands-on lab where I used tools such as Nmap to scan a virtual network, identify open ports, detect operating systems, and analyze potential vulnerabilities. This assignment strengthened my understanding of how attackers gather information and how defenders secure exposed services.<\/p>\n\n\n\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\">\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Screenshot-788-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"798\" height=\"222\" data-id=\"88\" src=\"https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Screenshot-788-1.png\" alt=\"\" class=\"wp-image-88\" srcset=\"https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Screenshot-788-1.png 798w, https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Screenshot-788-1-300x83.png 300w, https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Screenshot-788-1-768x214.png 768w, https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Screenshot-788-1-600x167.png 600w\" sizes=\"(max-width: 798px) 100vw, 798px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Screenshot-787-1.png\"><img loading=\"lazy\" decoding=\"async\" width=\"639\" height=\"176\" data-id=\"87\" src=\"https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Screenshot-787-1.png\" alt=\"\" class=\"wp-image-87\" srcset=\"https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Screenshot-787-1.png 639w, https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Screenshot-787-1-300x83.png 300w, https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Screenshot-787-1-600x165.png 600w\" sizes=\"(max-width: 639px) 100vw, 639px\" \/><\/a><\/figure>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Screenshot-786-2.png\"><img loading=\"lazy\" decoding=\"async\" width=\"705\" height=\"405\" data-id=\"86\" src=\"https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Screenshot-786-2.png\" alt=\"\" class=\"wp-image-86\" srcset=\"https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Screenshot-786-2.png 705w, https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Screenshot-786-2-300x172.png 300w, https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Screenshot-786-2-600x345.png 600w\" sizes=\"(max-width: 705px) 100vw, 705px\" \/><\/a><\/figure>\n<\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Artifact 2: Vulnerability Assessment with Nessus<\/strong><\/h3>\n\n\n\n<p>In this project, I ran a full vulnerability scan on a controlled environment using Nessus. I reviewed the report, interpreted critical findings, and documented remediation steps. This artifact demonstrates my ability to read, understand, and respond to vulnerability data in a structured and professional format.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><a href=\"https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Figure_B18228_01_07-3635875830-1.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"619\" src=\"https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Figure_B18228_01_07-3635875830-1-1024x619.jpg\" alt=\"\" class=\"wp-image-92\" srcset=\"https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Figure_B18228_01_07-3635875830-1-1024x619.jpg 1024w, https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Figure_B18228_01_07-3635875830-1-300x181.jpg 300w, https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Figure_B18228_01_07-3635875830-1-768x465.jpg 768w, https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Figure_B18228_01_07-3635875830-1-600x363.jpg 600w, https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Figure_B18228_01_07-3635875830-1-945x572.jpg 945w, https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Figure_B18228_01_07-3635875830-1.jpg 1334w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Artifact 3: Security Configuration and Hardening Exercise<\/strong><\/h3>\n\n\n\n<p>I worked on configuring a Linux system by applying basic security hardening steps, including firewall configuration, user permission adjustments, and log review. This artifact shows my ability to secure a system using foundational defense techniques.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Screenshot-789.png\"><img loading=\"lazy\" decoding=\"async\" width=\"495\" height=\"339\" src=\"https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Screenshot-789.png\" alt=\"\" class=\"wp-image-93\" srcset=\"https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Screenshot-789.png 495w, https:\/\/student.wp.odu.edu\/amarc013\/wp-content\/uploads\/sites\/30962\/2025\/12\/Screenshot-789-300x205.png 300w\" sizes=\"(max-width: 495px) 100vw, 495px\" \/><\/a><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Artifact 1: Network Enumeration and Security Analysis Lab I completed a hands-on lab where I used tools such as Nmap to scan a virtual network, identify open ports, detect operating systems, and analyze potential vulnerabilities. This assignment strengthened my understanding&#8230; <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/amarc013\/skill-1-cybersecurity-skills\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":25199,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/amarc013\/wp-json\/wp\/v2\/pages\/37"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/amarc013\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/amarc013\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/amarc013\/wp-json\/wp\/v2\/users\/25199"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/amarc013\/wp-json\/wp\/v2\/comments?post=37"}],"version-history":[{"count":3,"href":"https:\/\/student.wp.odu.edu\/amarc013\/wp-json\/wp\/v2\/pages\/37\/revisions"}],"predecessor-version":[{"id":94,"href":"https:\/\/student.wp.odu.edu\/amarc013\/wp-json\/wp\/v2\/pages\/37\/revisions\/94"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/amarc013\/wp-json\/wp\/v2\/media?parent=37"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}