{"id":59,"date":"2026-01-25T18:08:09","date_gmt":"2026-01-25T18:08:09","guid":{"rendered":"https:\/\/student.wp.odu.edu\/cargi001\/?page_id=59"},"modified":"2026-01-29T14:09:56","modified_gmt":"2026-01-29T14:09:56","slug":"skills","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/cargi001\/skills\/","title":{"rendered":"Skills"},"content":{"rendered":"\n<p>This page documents the technical and analytical skills I&#8217;ve developed throughout my cybersecurity education. Each skill area represents hands-on experience gained through coursework, lab exercises, and practical projects. These competencies prepare me for real-world security challenges and professional certification paths.<\/p>\n\n\n\n<p><strong>Key Competencies:<\/strong><\/p>\n\n\n\n<ul>\n<li>Vulnerability scanning and assessment<\/li>\n\n\n\n<li>Metasploit framework operation<\/li>\n\n\n\n<li>Reverse shell establishment and analysis<\/li>\n\n\n\n<li>Security control bypass techniques and defenses<\/li>\n\n\n\n<li>Wireshark packet capture and protocol analysis<\/li>\n\n\n\n<li>Wireless security assessment (WEP\/WPA\/WPA2)<\/li>\n\n\n\n<li>Network traffic decryption and analysis<\/li>\n\n\n\n<li>aircrack-ng suite operation<\/li>\n\n\n\n<li>Linux password hash extraction and cracking<\/li>\n\n\n\n<li>Windows credential dumping and analysis<\/li>\n\n\n\n<li>Dictionary and brute force attack methodologies<\/li>\n\n\n\n<li>Hash algorithm identification (MD5, NTLM)<\/li>\n\n\n\n<li>Utilitarian and deontological ethical analysis<\/li>\n\n\n\n<li>Cybersecurity policy evaluation<\/li>\n\n\n\n<li>Stakeholder impact assessment<\/li>\n\n\n\n<li>Scholarly research and APA documentation<\/li>\n<\/ul>\n\n\n\n<p>Essential Work Habits<\/p>\n\n\n\n<ul>\n<li>I tackle security tasks systematically and understand the importance of being thorough. Success in my CYSE 301 labs depended on documenting each step with screenshot proof. Professional security work relies on thoroughness and documentation. My instructor wrote in my entrepreneurship self-check that I showed \u201cdedication and adaptability\u201d when faced with challenges. Running Argent Marketing Agency during college has taught me to constantly prioritize and execute despite multiple priorities.<br>Proof: CYSE 301 Labs, CYSE 494 Self Check (with instructor comments), Argent Marketing Agency<\/li>\n<\/ul>\n\n\n\n<p>Soft Skills<\/p>\n\n\n\n<ul>\n<li>I can relay technical information to both technical and non-technical people. I presented to my Sigma Phi Epsilon chapter as Vice President of Communications. Through Argent Marketing Agency, I help clients understand how online marketing concepts can help grow their business. Through CYSE 425W I practiced my technical writing skills with analysis on cyber ethics.<br>Proof: Presentations to fraternity members, communication with clients at Argent Marketing Agency, CYSE 425W Policy Papers<\/li>\n<\/ul>\n\n\n\n<p>Solid Technical Foundation<\/p>\n\n\n\n<ul>\n<li>I have experience with operating systems, networking, and virtualization. My personal Hyper-V lab consists of Kali Linux virtual machines and Windows installations. While working as a field engineer, I configured Nokia 5G\/4G LTE systems and learned about real world network topology. I write Python and Bash scripts for security-related tasks. I\u2019ve used Google Tag Manager to implement JavaScript trackers. I am also CompTIA A+ and Network+ certified.<br>Proof: CompTIA A+ and Network+ Certificates, CYSE 301 labs, field experience, Google Tag Manager usage documentation<\/li>\n<\/ul>\n\n\n\n<p>Detailed Knowledge of Key Technologies<\/p>\n\n\n\n<p>Technology Details<br>Linux Kali Linux, user\/group management, hashes<br>Microsoft Windows, extraction of credentials, password cracking with John the Ripper and Cain &amp; Abel<br>Wireless WEP\/WPA2 cracking with aircrack-ng suite<br>Network Security Wireshark, analyzing packet data and protocol hierarchy<br>Web Google Tag Manager, implementing Google Analytics trackers<br>Misc. Metasploit, John the Ripper, aircrack-ng, Wireshark, steghide<\/p>\n\n\n\n<p>Proof: CYSE 301 Wireless Security, Password Cracking Lab, Steganography Exercise, Penetration Testing Lab, CompTIA A+ and Network+ Courses<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This page documents the technical and analytical skills I&#8217;ve developed throughout my cybersecurity education. Each skill area represents hands-on experience gained through coursework, lab exercises, and practical projects. These competencies prepare me for real-world security challenges and professional certification paths&#8230;. <a class=\"more-link\" href=\"https:\/\/student.wp.odu.edu\/cargi001\/skills\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":30381,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","wds_primary_avhec_catgroup":0},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/pages\/59"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/users\/30381"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/comments?post=59"}],"version-history":[{"count":2,"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/pages\/59\/revisions"}],"predecessor-version":[{"id":83,"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/pages\/59\/revisions\/83"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/cargi001\/wp-json\/wp\/v2\/media?parent=59"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}