Cybersecurity Portfolio

Jordin Myers | Cybersecurity Student

Certifications

  • Google Cybersecurity Certificate (IN PROGRESS) - Google, 2024

Courses

Foundations of Cybersecurity

  • Description: Students are introduced to the world of cybersecurity through an interactive curriculum developed by Google. Students will identify significant events that led to the development of the cybersecurity field, explain the importance of cybersecurity in today's business operations, and explore the job responsibilities and skills of an entry-level cybersecurity analyst.
  • Skills Gained:
    • Identify how security attacks impact business operations
    • Explore the job responsibilities and core skills of an entry-level cybersecurity analyst
    • Recognize how past and present attacks on organizations led to the development of the cybersecurity field
    • Learn the CISSP eight security domains
    • Identify security domains, frameworks, and controls
    • Explain security ethics
    • Recognize common tools used by cybersecurity analysts
  • Link: Certificate

Programming with Python

  • Description: Students are introduced to Python programming, covering core concepts such as variables, control structures, functions, and object-oriented programming.
  • Skills Gained:
    • Proficient in Python
    • Write, debug, and optimize Python scripts
    • Apply data manipulation, automation, and basic cybersecurity tasks
  • Link: INF-360 Repository

Intro. to Web Development

  • Description: Students are provided with the concepts and skills for planning, development, and deployment of web-based hypermedia systems. It covers the use of text, graphics, audio, and video in web environments and the conversion of existing systems to web environments
  • Skills Gained:
    • Proficient in HTML
    • Proficient in CSS
    • Web design best practices
  • Link: INF-250 Repository

Tools of the Trade: Linux and SQL

  • Description: Students explore computing skills that are used on-the-job as a cybersecurity analyst. Students practice using Linux, an operating system commonly used by cybersecurity professionals. For example, students use the Linux command line through the Bash shell to navigate and manage the file system and authenticate users. Then, students use SQL to communicate with a database.
  • Skills Gained:
    • Explain the relationship between operating systems, applications, and hardware
    • Compare a graphical user interface to a command line interface
    • Identify the unique features of common Linux distributions
    • Navigate and manage the file system using Linux commands via the Bash shell
    • Use Linux commands via the Bash shell to authenticate and authorize users
    • Describe how a relational database is organized
    • Use SQL to retrieve information from a database
    • Apply filters to SQL queries and use joins to combine multiple tables
  • Link: Certificate

Connect and Protect: Networks and Network Security

  • Description: Students will explore how networks connect multiple devices and allow them to communicate. Students start with the fundamentals of modern networking operations and protocols. For example, the Transmission Control Protocol / Internet Protocol (TCP/IP) model and how network hardware, like routers and modems, allow computers to send and receive information on the internet. Then, students learn about network security. Organizations often store and send valuable information on their networks, so networks are common targets of cyber attacks. By the end of this course, students are able to recognize network-level vulnerabilities, and explain how to secure a network using firewalls, system hardening, and virtual private networks.
  • Skills Gained:
    • Describe the structure of different computer networks
    • Illustrate how data is sent and received over a network
    • Recognize common network protocols
    • Identify common network security measures and protocols
    • Explain how to secure a network against intrusion tactics
    • Compare and contrast local networks to cloud computing
    • Explain the different types of system hardening techniques
  • Link: Certificate

Play It Safe: Manage Security Risks

  • Description: Students take a deeper dive into concepts introduced in Foundations of Cybersecurity, with an emphasis on how cybersecurity professionals use frameworks and controls to protect business operations. In particular, students identify the steps of risk management and explore common threats, risks, and vulnerabilities. Additionally, students explore Security Information and Event Management (SIEM) data and use a playbook to respond to identified threats, risks, and vulnerabilities. Finally, students take an important step towards becoming a cybersecurity professional and practice performing a security audit.
  • Skills Gained:
    • Identify the common threats, risks, and vulnerabilities to business operations
    • Understand the threats, risks, and vulnerabilities that entry-level cybersecurity analysts are most focused on
    • Comprehend the purpose of security frameworks and controls
    • Describe the confidentiality, integrity, and availability (CIA) triad
    • Explain the National Institute of Standards and Technology (NIST) framework
    • Explore and practice conducting a security audit
    • Use a playbook to respond to threats, risks, and vulnerabilities
  • Link: Certificate