Quinn
Hello, I'm

Quinn

Cybersecurity @ Old Dominion University

Who I Am

Cybersecurity major at ODU. I like breaking things in labs and figuring out how to put them back together stronger. Right now I'm deep into networking, Linux, and cyber law — and looking for an internship or entry-level role where I can keep learning and building real-world skills.

ODU
University
CYSE
Major
13+
Courses
2028
Expected Grad

Coursework & Reflections

Click each course to explore highlights, reflections, and artifacts from my work.

CYSE 495
Topics: Intro to Networking & Security
Spring 2026 • In Progress
+

Advanced topics course covering network infrastructure design, protocol security, encryption standards, and defense-in-depth strategies for enterprise environments.

  • Designed a full network wiring plan and infrastructure layout for Constant Hall at ODU
  • Studied IPv6 security implications and transition vulnerabilities
  • Explored PKI frameworks, certificate authorities, and FIDO authentication standards
  • Analyzed SSO implementations and authentication protocols
Reflection

Write your reflection here. What did you learn about network security? What challenges did you overcome?

Artifacts
Network DesignPKIIPv6Infrastructure
CYSE 270
Linux System for Cybersecurity
Spring 2026 • In Progress
+

Hands-on Linux administration and system security, covering user management, file permissions, shell scripting, and security hardening on Kali Linux.

  • Managed user/group accounts and configured access control policies on Kali Linux
  • Completed password cracking lab using John the Ripper
  • Worked extensively with Vi editor for system configuration and scripting
  • Configured file permissions and ownership for multi-user environments
Reflection

Write your reflection here. What hands-on skills did you build? How did working in the Linux terminal change your approach to security?

Artifacts
Kali LinuxJohn the RipperVi EditorPermissions
CYSE 300
Introduction to Cybersecurity
Spring 2026 • In Progress
+

Comprehensive introduction to the cybersecurity landscape, including threat actors, attack methods, incident response, and real-world case studies.

  • Authored a research paper analyzing the 2013 Target data breach
  • Designed a custom internet protocol stack (NEXUS/NovaNET)
  • Studied CIA triad, defense in depth, and risk management
  • Compared VirtualBox vs. VMware for secure lab environments
Reflection

Write your reflection here. How did this course introduce you to the field? What surprised you about real-world breaches?

Artifacts
Incident AnalysisProtocol DesignRisk Management
CYSE 406
Cyber Law
Spring 2026 • In Progress
+

Legal frameworks governing cyberspace, including constitutional protections, digital privacy, government surveillance, and whistleblower cases.

  • Analyzed Fourth Amendment implications in digital surveillance
  • Researched Julian Assange / WikiLeaks and transparency vs. national security
  • Explored government transparency policies and cyber operations
  • Studied legal precedents in data privacy regulation
Reflection

Write your reflection here. How did studying cyber law change your perspective? What ethical tensions stood out?

Artifacts
4th AmendmentDigital PrivacyWikiLeaksPolicy
CRJS 310
Cybercriminology: Foundations
Fall 2025 • Grade: A
+

Study of criminal behavior in digital spaces, cybercrime typologies, digital forensics foundations, and the factors driving cybercriminal activity.

  • Add your key projects, papers, or topics from this course
  • Add another highlight here
Reflection

Write your reflection here. How does understanding criminal behavior inform your cybersecurity perspective?

Artifacts
CybercrimeDigital ForensicsCriminal Justice
CYSE 250
Basic Cybersecurity Programming & Networking
Fall 2025 • Grade: A-
+

Programming concepts and networking fundamentals applied to cybersecurity, including scripting, TCP/IP, subnetting, and network troubleshooting.

  • Add your key projects, papers, or topics from this course
  • Add another highlight here
Reflection

Write your reflection here. How did programming and networking fundamentals build your technical foundation?

Artifacts
ProgrammingTCP/IPNetworkingScripting
CYSE 200T
Cybersecurity, Technology, and Society
Fall 2024 • Grade: A
+

Exploration of cybersecurity's role in society, examining how technology intersects with culture, policy, ethics, and global security challenges.

  • Add your key projects, papers, or topics from this course
  • Add another highlight here
Reflection

Write your reflection here. How did this course broaden your view of cybersecurity beyond the technical?

Artifacts
SocietyEthicsTechnologyPolicy
CYSE 201S
Cybersecurity and the Social Sciences
Spring 2025 • Grade: B+
+

Interdisciplinary study connecting cybersecurity to social science research methods, human behavior, and the social dimensions of digital security.

  • Add your key projects, papers, or topics from this course
  • Add another highlight here
Reflection

Write your reflection here. What social science perspectives changed how you think about security?

Artifacts
Social ScienceResearchHuman Behavior
IDS 300W
Interdisciplinary Theory & Concepts
Spring 2026 • In Progress
+

Writing-intensive course presenting cybersecurity as an interdisciplinary field, strengthening research methodology and APA-formatted academic writing.

  • Completed APA-formatted essay on cybersecurity as an interdisciplinary field
  • Developed technical writing skills for security documentation
  • Strengthened ability to communicate complex concepts to non-technical audiences
Reflection

Write your reflection here. How did this course improve your ability to communicate technical concepts?

Artifacts
APA WritingResearchTechnical Communication
PHIL 230E
Introduction to Ethics
Fall 2025 • Grade: A-
+

Ethical reasoning and moral philosophy, providing a critical framework for evaluating dilemmas in cybersecurity, privacy, and technology.

  • Add your key projects, papers, or topics from this course
  • Add another highlight here
Reflection

Write your reflection here. How does ethical reasoning apply to cybersecurity decisions?

Artifacts
EthicsPhilosophyMoral Reasoning
CRJS 215S
Introduction to Criminology
Fall 2024 • Grade: C+
+

Foundational study of crime, justice systems, and sociological theories explaining criminal behavior — essential context for understanding cybercrime.

  • Add your key projects, papers, or topics from this course
  • Add another highlight here
Reflection

Write your reflection here. How did this course set the stage for your cybercriminology studies?

Artifacts
Criminal JusticeSociologyTheory

Technical Arsenal

Security & Networking

Network Security
Penetration Testing
Authentication & PKI
Threat Analysis

Systems & Tools

Linux / Kali Linux
Virtualization (VMs)
Wireshark / Nmap
Technical Writing

Certifications & Coursework

2022 — 2028 (Expected)

B.S. Cybersecurity

Old Dominion University — Norfolk, VA

Focused on network security, system administration, and cyber law. Hands-on lab experience with Linux, penetration testing tools, and secure infrastructure design.

Add your experience

Internship / Work Experience

Company Name

Describe your role and responsibilities here. Update this section as you gain experience.

Let's Connect

Open to internships, collaborations, and security conversations.

Email
quinn.doak@gmail.com
LinkedIn
/in/quinn-doak
GitHub
@QuinnDoak