Learning JavaScript, HTML and CSS

One of my goals is to expand my programming skills. I decided to learn JavaScript since we use it at work for web pages and sites. I do have basic knowledge of HTML, CSS, Linux and C+ from prior work and educational experience.

First day, learning from the book , “Get Coding.” This book incorporates learning HTML, CSS, and JavaScript all at once. The book teaches you how to build a website, an APP, and a game. The audience is directed towards kids. I recommend this book for adults since it is easy to read and has pictures demonstrating what the code and final product should look like. The writing style is simple and you can download information, code, and images from their website https://getcodingkids.com/.

Second day, involved building the website immediately using HTML after creating a Coding folder and opening NotePad++ as my text editor. The book describes the requirements for each topic then offers a Code Skills section at the end of each chapter. I found this beneficial, especially for people with little or no programming experience. This book is great at explaining the process step by step while providing a fun learning environment, which engages the student. Ready to learn more!

Women in Cybersecurity (WiCyS)

Pursuing a career in cybersecurity is still a goal.  Despite a few obstacles along the way. I am still committed.  I joined WiCy.  WiCyS is the only nonprofit membership organization with national reach that is dedicated to bringing together women in cybersecurity from academia, research and industry to share knowledge, experience, networking and mentoring.  I am thrilled to be part of a dynamic organization, women reaching out to other women.

“Each year, WiCyS holds an annual conference with a local host university partner  – next year’s WiCyS Conference will be hosted by Carnegie Mellon University March 29-30 in Pittsburgh. The WiCyS Conference is an excellent opportunity for companies to connect with women students and candidates to recruit them into the field!”

I plan to be actively involved in this organization.  Learn more about WiCyS at  https://www.wicys.org 

Seattle Give Camp 2018

This year was my sixth year volunteering at Seattle Give Camp; another fun weekend hack-a-thon.  The group develops software tools and applications for non-profits in the Seattle area.  The event took place at the Commons on Microsoft Campus in Redmond, WA.

This year I volunteered on a team of nine for La Leche League of Washington.  Their focus is mothers who are breastfeeding their babies.  My contribution to the team was planning, editing photos and creating graphics for the web site.  The team migrated the Drupal web site to a WordPress web-site.  A few challenges for the team,  we solved them.  We did attend a WordPress training session on Saturday, which was beneficial. for the team and La Leche League.  La Leche League is an International organization, more details on their services here  La Leche League of Washington

Thank you to our sponsor and volunteers.  Learn more about  Seattle Give Camp










Leading with Kindness

Sharing this article from Inc., because I believe in leading with kindness.  Taking the time to listen to others and their life stories offers insight to who they are and what their values are.  People are a valuable resource, not a commodity to be traded.  Empathy, sincerity and vulnerability should be embraced as a strength, these traits are learned through experience and not a text book.  People are individuals with potential to be outstanding team members with great ideas to share and make this a better world.

Why You Should Lead With Kindness



Malware Tools

A great time learning from other hackers, Jesse Moore shared his slide presentation on Adversary Tactics Configuration Management with the South Sound Hackers meetup.

Takeaways for me included.

Always be prepared – Patch Software

Benchmark Your Starting Point

Biggest Threat to an Organization – 93% from phishing and pretexting;

96% most common attack vector was from Email

Configuration Best Practices:  CIS CAT PRO, CIS Benchmarks and CIS Controls

Mitigation Detection, Check out  ATT&CK  Technique Matrix

I did order my free poster from SAN DFIR, a resource for Digital Resources and Incident Response


Taking the Initiative

In the world of STEAM, women need to speak up and inform their peers on what projects they are working on and what is really  happening in the workplace.  If you need help or guidance speak up and be heard.  I attached a link to an article that addresses actions women can take to improve their work environment and career.  See link below.

4 Proven Ways Women in Male-Dominated Fields Can Establish Themselves and Feel Fulfilled at Work

Your Greatest Strength

Your greatest strength is being yourself.

You should be able to be yourself at work. It means treating everyone with kindness and treating people how you would like to be treated.  All human beings are valuable, no matter what our differences or personal history.  The best teams work together, everyone provides input and respects one another.  Creating ideas to change the world evolves from working together, not against each other.Diversity Outperforms (1)

Cyber Defense First Responder Training

Recently, I earned a Certificate for Cyber Defense First Responder.  The course covered the  incident response process and the role of the Cyber Defense First Responder.  Topics included  identifying methods for  Cyber Security Incident Response Team training and testing and testing.

Create an evidence map of your network and identify various types of evidence at each point, and document potential compromises for access points within the network.  The tool Nessus Professional , a vulnerability scanner, was recommended in conjunction with the evidence map to prevent network attacks.

Another tool discussed and demonstrated was  Windows Live Responsive. It is a forensic tool to collect and analyze data and evidence on a computer. We also imaged a hard drive and used write blockers to collect evidence.  The Chain of Custody of any evidence gathered in an investigation is critical, document the process throughout the process. It is very important that you have authorization to examine a computer and any related evidence  before you even begin download any data.

The course covered Rules of Evidence, legal processes, proof of expertise, licensing professional forensic tools for investigations , and cyber defense methodology.  The hands-on demonstrations in class reinforced the skills and knowledge throughout the day.  Overall, I expanded my cyber security knowledge base,  learned how to use more forensic tools and had fun.

%d bloggers like this: