This page documents the technical and analytical skills I’ve developed throughout my cybersecurity education. Each skill area represents hands-on experience gained through coursework, lab exercises, and practical projects. These competencies prepare me for real-world security challenges and professional certification paths.

Key Competencies:

  • Vulnerability scanning and assessment
  • Metasploit framework operation
  • Reverse shell establishment and analysis
  • Security control bypass techniques and defenses
  • Wireshark packet capture and protocol analysis
  • Wireless security assessment (WEP/WPA/WPA2)
  • Network traffic decryption and analysis
  • aircrack-ng suite operation
  • Linux password hash extraction and cracking
  • Windows credential dumping and analysis
  • Dictionary and brute force attack methodologies
  • Hash algorithm identification (MD5, NTLM)
  • Utilitarian and deontological ethical analysis
  • Cybersecurity policy evaluation
  • Stakeholder impact assessment
  • Scholarly research and APA documentation

Essential Work Habits

  • I tackle security tasks systematically and understand the importance of being thorough. Success in my CYSE 301 labs depended on documenting each step with screenshot proof. Professional security work relies on thoroughness and documentation. My instructor wrote in my entrepreneurship self-check that I showed “dedication and adaptability” when faced with challenges. Running Argent Marketing Agency during college has taught me to constantly prioritize and execute despite multiple priorities.
    Proof: CYSE 301 Labs, CYSE 494 Self Check (with instructor comments), Argent Marketing Agency

Soft Skills

  • I can relay technical information to both technical and non-technical people. I presented to my Sigma Phi Epsilon chapter as Vice President of Communications. Through Argent Marketing Agency, I help clients understand how online marketing concepts can help grow their business. Through CYSE 425W I practiced my technical writing skills with analysis on cyber ethics.
    Proof: Presentations to fraternity members, communication with clients at Argent Marketing Agency, CYSE 425W Policy Papers

Solid Technical Foundation

  • I have experience with operating systems, networking, and virtualization. My personal Hyper-V lab consists of Kali Linux virtual machines and Windows installations. While working as a field engineer, I configured Nokia 5G/4G LTE systems and learned about real world network topology. I write Python and Bash scripts for security-related tasks. I’ve used Google Tag Manager to implement JavaScript trackers. I am also CompTIA A+ and Network+ certified.
    Proof: CompTIA A+ and Network+ Certificates, CYSE 301 labs, field experience, Google Tag Manager usage documentation

Detailed Knowledge of Key Technologies

Technology Details
Linux Kali Linux, user/group management, hashes
Microsoft Windows, extraction of credentials, password cracking with John the Ripper and Cain & Abel
Wireless WEP/WPA2 cracking with aircrack-ng suite
Network Security Wireshark, analyzing packet data and protocol hierarchy
Web Google Tag Manager, implementing Google Analytics trackers
Misc. Metasploit, John the Ripper, aircrack-ng, Wireshark, steghide

Proof: CYSE 301 Wireless Security, Password Cracking Lab, Steganography Exercise, Penetration Testing Lab, CompTIA A+ and Network+ Courses