

{"id":18999,"date":"2024-06-10T19:27:45","date_gmt":"2024-06-10T19:27:45","guid":{"rendered":"https:\/\/lichangesummer.org\/2024studentsite\/?page_id=18999"},"modified":"2024-08-12T18:26:50","modified_gmt":"2024-08-12T18:26:50","slug":"cyberisaiahwalker","status":"publish","type":"page","link":"https:\/\/lichangesummer.org\/2024studentsite\/cyberisaiahwalker\/","title":{"rendered":"CyberIsaiahWalker"},"content":{"rendered":"<style type=\"text\/css\"><\/style>\r\n<div class=\"wp-block-cover is-light home-banner\" style=\"min-height: 50px;aspect-ratio:unset;\">\r\n<div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<div class=\"wp-block-columns home-banner-column is-layout-flex wp-container-core-columns-is-layout-3 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column home-banner-left-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis: 60%;\">\r\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" class=\"wp-image-8322\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/cybersecurity-logo-min.png\" alt=\"\" \/><\/figure>\r\n\r\n\r\n\r\n<h2 id=\"h-student-name\" class=\"wp-block-heading has-text-color has-montserrat-font-family has-custom-font\" style=\"color: #8b2927; font-size: 51px; font-style: normal; font-weight: 500; font-family: Montserrat;\">Isaiah Walker<\/h2>\r\n\r\n\r\n\r\n<div class=\"wp-block-columns slider-1-block is-layout-flex wp-container-core-columns-is-layout-1 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column slider-1-block-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<p class=\"has-text-color has-custom-lineheight\" style=\"color: #445aa3; font-size: 31px; line-height: 1;\"><em>The Bullis School<\/em><br \/><em>Class of 2027<\/em><\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 21px; font-style: normal; font-weight: 200;\">Received a thorough hands-on introduction to Linux and other cybersecurity software including WireShark.<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 21px; font-style: normal; font-weight: 200;\">Worked with global experts from various cybersecurity fields to learn advanced concepts including firewall establishment, CIA Triads, Threat Detection\/Analysis, Training Recommendations, and Legal Policies.<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 21px; font-style: normal; font-weight: 200;\">Created a cybersecurity protocol proposal for a nonprofit organization to best protect their client\u2019s data and personal information using network and physical security recommendations.<\/p>\r\n\r\n\r\n\r\n<p class=\"learn-more-button has-text-color\" style=\"color: #000000; font-size: 21px; font-style: normal; font-weight: 200;\"><strong><em>Learn more about Isaiah here.<\/em><\/strong><\/p>\r\n<\/div>\r\n<\/div>\r\n\r\n<div class=\"wp-block-columns slider-block is-layout-flex wp-container-core-columns-is-layout-2 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column slider-block-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<p style=\"font-size: 12px; font-style: normal; font-weight: 200;\">Isaiah Walker is excited to participate in the Cybersecurity and Defense Program this summer. He is grateful for the opportunity to have hands on experience with cyber-attack prevention techniques. He also looks forward to meeting key players and experts in the field of Cybersecurity.\r\n<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 12px; font-style: normal; font-weight: 200;\">As a rising sophomore at Bullis High School, Isaiah is a dedicated honor student with an interest in Engineering. He intends to seek Advance Placement in Science, English, and Spanish. Isaiah plays on the Varsity Crew Team and Varsity Swimming Team. He is also a Brown Belt in Kung Fu.In the future, Isaiah would like to study nuclear engineering. His interest in nuclear engineering began when he attended the United States Naval Academy Summer STEM Program last year. Isaiah has also participated in the Verizon Innovative Program and the National Society of Black Engineers Junior Engineering Program. \r\n<\/p>\r\n\r\n\r\n\r\n<p style=\"font-size: 12px; font-style: normal; font-weight: 200;\">Outside of school, Isaiah is a member of the Youth Usher Ministry at his church and a member of the Teen Group of Jack &#038; Jill of America, Inc. Nation&#8217;s Capital Chapter. Isaiah has participated various community service projects and recently traveled to Taiwan with the Bullis Global Studies Program. \r\n<\/p>\r\n\r\n\r\n\r\n<p class=\"learn-more-button-neuro has-text-color\" style=\"color: #000000; font-size: 21px; font-style: normal; font-weight: 200;\"><strong><em>Read more about Isaiah&#8217;s achievements here.<\/em><\/strong><\/p>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column home-banner-right-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis: 40%;\">\r\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" class=\"wp-image-7887\" src=\"https:\/\/lichangesummer.org\/2024studentsite\/wp-content\/uploads\/2024\/08\/IMG_2592.png\" alt=\"\" \/><\/figure>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n<\/div>\r\n\r\n<div class=\"wp-block-cover is-light my-neuroscience-training\" style=\"min-height:50px;aspect-ratio:unset;\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<h2 class=\"wp-block-heading has-text-align-center has-text-color\" id=\"h-my-cybersecurity-training\" style=\"color:#445aa3;font-size:51px;font-style:normal;font-weight:600\">My Cybersecurity Training<\/h2>\r\n\r\n\r\n\r\n<div class=\"wp-block-columns my-neuroscience-training-columns is-layout-flex wp-container-core-columns-is-layout-4 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column my-neuroscience-training-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<figure class=\"wp-block-image size-full my-neuroscience-training-column-image\"><a href=\"#about\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/security-highlight-1-min-1.png\" alt=\"\" class=\"wp-image-8462\"\/><\/a><\/figure>\r\n\r\n\r\n\r\n<p class=\"has-text-align-center has-text-color has-custom-lineheight\" style=\"color:#ffffff;font-size:29px;font-style:normal;font-weight:600;line-height:1.21\"><a href=\"#about\">Business<br> Collaboration<\/a><\/p>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column my-neuroscience-training-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<figure class=\"wp-block-image size-full my-neuroscience-training-column-image\"><a href=\"#proposal\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/about-min.png\" alt=\"\" class=\"wp-image-8463\"\/><\/a><\/figure>\r\n\r\n\r\n\r\n<p class=\"has-text-align-center has-text-color has-custom-lineheight\" style=\"color:#ffffff;font-size:29px;font-style:normal;font-weight:600;line-height:1.21\"><a href=\"#proposal\">My Cybersecurity<br> Proposal<\/a><\/p>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column my-neuroscience-training-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<figure class=\"wp-block-image size-full my-neuroscience-training-column-image\"><a href=\"#presentation\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/proposal.png\" alt=\"\" class=\"wp-image-8464\"\/><\/a><\/figure>\r\n\r\n\r\n\r\n<p class=\"has-text-align-center has-text-color has-custom-lineheight\" style=\"color:#ffffff;font-size:29px;font-style:normal;font-weight:600;line-height:1.21\"><a href=\"#presentation\">My Cybersecurity <br>Presentation<\/a><\/p>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column my-neuroscience-training-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<figure class=\"wp-block-image size-full my-neuroscience-training-column-image\"><a href=\"#highlights\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/ethernet.png\" alt=\"\" class=\"wp-image-8465\"\/><\/a><\/figure>\r\n\r\n\r\n\r\n<p class=\"has-text-align-center has-text-color has-custom-lineheight\" style=\"color:#ffffff;font-size:29px;font-style:normal;font-weight:600;line-height:1.21\"><a href=\"#highlights\">Internship<br> Highlights<\/a><\/p>\r\n<\/div>\r\n<\/div>\r\n<\/div><\/div>\r\n\r\n\r\n<div class=\"wp-block-cover is-light business-partner-blocks\" style=\"min-height:50px;aspect-ratio:unset;\" id=\"about\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<h2 class=\"wp-block-heading has-text-align-center has-text-color\" id=\"h-business-partner-overview\" style=\"color:#445aa3;font-size:51px;font-style:normal;font-weight:600\">Business Partner Overview<\/h2>\r\n\r\n\r\n  \r\n    <div class=\"main\">\r\n  <div class=\"slider slider-for-business-partner\">\r\n          <div class=\"business_heading\">\r\n      <div class=\"business-partner-block\">\r\n            <div class=\"content_image_block\">\r\n                <div class=\"business-content\">\r\n                    <div class=\"business-logo\">\r\n                        <img decoding=\"async\" class=\"sliders_images\" src=\"\" \/>\r\n                    <\/div>\r\n                    <div class=\"business-heading\">\r\n                        <h3>Capitol City Robotics<\/h3>\r\n                        <h4>Quick Facts<\/h4>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"business-content-para\">\r\n                    <p>Capitol City Robotics is an award-winning robotic nonprofit program that competes all over the country, against programs from all walks of life. They have Championed numerous National competitions for drones and robotics. Capitol City Robotics has qualified for the VEX Robotics World Championship for the past three years.<p>\r\n\r\n<p>The nonprofit organization holds multiple programs for children of all ages, ranging from Lego leagues to RECF Aerial Drones. The students have a hands-on experience where they program and code all the robots themselves. They have had the opportunity to meet Jeff Bezos at the unveiling of Blue Origin\u2019s lunar lander. The organization also provides summer camps for students so they can continue their experience outside the school year and strengthen their STEM commitment.<p>\r\n                <\/div>\r\n            <\/div>\r\n                <div class=\"business-image\">\r\n                    <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2024studentsite\/wp-content\/uploads\/2024\/07\/img-0718_orig.jpg\" \/>\r\n                <\/div>\r\n          \r\n      <\/div>\r\n      <\/div>\r\n             <div class=\"business_heading\">\r\n      <div class=\"business-partner-block\">\r\n            <div class=\"content_image_block\">\r\n                <div class=\"business-content\">\r\n                    <div class=\"business-logo\">\r\n                        <img decoding=\"async\" class=\"sliders_images\" src=\"\" \/>\r\n                    <\/div>\r\n                    <div class=\"business-heading\">\r\n                        <h3>Capitol City Robotics<\/h3>\r\n                        <h4>About the Founder<\/h4>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"business-content-para\">\r\n                    <p>Ryan \u201cMike\u201d Daza is the founder and Executive Director of Capitol City Robotics and the founder and director of operations at Capitol City STEM LLC. He is a graduate of the University of Wisconsin-Madison for his undergraduate and George Mason University for a Master's in economics.<p>\r\n\r\n<p>He has worked on data pertinent to legal cases with numerous lawyers and professors. Ryan\u2019s background and passion for STEM-focused activities are fueled by his children and the belief that technology is the way of the future. He has published several articles on political economy and created systems that more effectively handle data collection in large quantities. He hopes that his continued work in the STEM field and research will continue to support generations of children.<p>                <\/div>\r\n            <\/div>\r\n                <div class=\"business-image\">\r\n                    <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2024studentsite\/wp-content\/uploads\/2024\/07\/7bc5e8_44e07d22736f4f5f9a40776887e2567fmv2.webp\" \/>\r\n                <\/div>\r\n          \r\n      <\/div>\r\n      <\/div>\r\n             <div class=\"business_heading\">\r\n      <div class=\"business-partner-block\">\r\n            <div class=\"content_image_block\">\r\n                <div class=\"business-content\">\r\n                    <div class=\"business-logo\">\r\n                        <img decoding=\"async\" class=\"sliders_images\" src=\"\" \/>\r\n                    <\/div>\r\n                    <div class=\"business-heading\">\r\n                        <h3>Capitol City Robotics<\/h3>\r\n                        <h4>About the Business<\/h4>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"business-content-para\">\r\n                    <p>Capitol City Robotics is a 501(c) non-profit that works with students in underrepresented schools to gain insight into a STEM background. Using robotics as a catapult for education, the organization aims to foster an environment that promotes skills students will rely on with a focus on engineering and computer science. This program exposes students K-12 to a field of STEM-backed careers while simultaneously representing the inclusiveness and diversity seen today.<p>\r\n\r\n<p>Capitol City Robotics strives to create a space where inclusion and STEM can foster young minds. Through their partnership with various experts in computer science, they are exposing students in underrepresented communities to the opportunity to expand their knowledge and grow their love for robotics. Their goal is to prepare students to be the leaders of tomorrow.<p>                <\/div>\r\n            <\/div>\r\n                <div class=\"business-image\">\r\n                    <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2024studentsite\/wp-content\/uploads\/2024\/07\/1675708062645.jpeg\" \/>\r\n                <\/div>\r\n          \r\n      <\/div>\r\n      <\/div>\r\n             <div class=\"business_heading\">\r\n      <div class=\"business-partner-block\">\r\n            <div class=\"content_image_block\">\r\n                <div class=\"business-content\">\r\n                    <div class=\"business-logo\">\r\n                        <img decoding=\"async\" class=\"sliders_images\" src=\"\" \/>\r\n                    <\/div>\r\n                    <div class=\"business-heading\">\r\n                        <h3>Capitol City Robotics<\/h3>\r\n                        <h4>Current Vulnerabilities<\/h4>\r\n                    <\/div>\r\n                <\/div>\r\n                <div class=\"business-content-para\">\r\n                    <p>As a STEM-based organization that specializes in computer science, we are very aware of the threats hacking poses which is why we are aiming to bolster our cybersecurity.<p>\r\n\r\n<p>Building a system that protects our staff\u2019s personal information, such as W9s, would create a better sense of safety. We want to ensure that the organization\u2019s online property is protected, so access to public domains and accounts would require more intensive cyber protection.<p>                <\/div>\r\n            <\/div>\r\n                <div class=\"business-image\">\r\n                    <img decoding=\"async\" class=\"sliders_images\" src=\"https:\/\/lichangesummer.org\/2024studentsite\/wp-content\/uploads\/2024\/07\/431cb5a6-d527-4a32-a4b2-1bbdf5ac847c-poster_9b8ff84344d645fcb5152f0ecff8bfd0.png\" \/>\r\n                <\/div>\r\n          \r\n      <\/div>\r\n      <\/div>\r\n       \t \r\n\r\n  <\/div>\r\n\t\t <div class=\"action slider slider-nav\">\r\n\t               <a data-slide=\"1\" class=\"\">Quick Facts<\/a>\r\n                <a data-slide=\"2\" class=\"\">About the Founder<\/a>\r\n                <a data-slide=\"3\" class=\"\">About the Business<\/a>\r\n                <a data-slide=\"4\" class=\"\">Current Vulnerabilities<\/a>\r\n          <\/div>\r\n<\/div>\r\n\r\n<link rel=\"stylesheet\" type=\"text\/css\" href=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/slick-carousel\/1.5.9\/slick.min.css\">\r\n    <link rel=\"stylesheet\" type=\"text\/css\" href=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/slick-carousel\/1.5.9\/slick-theme.min.css\"> \r\n  <script src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/jquery\/3.6.0\/jquery.min.js\"><\/script>\r\n  <script src=\"https:\/\/cdnjs.cloudflare.com\/ajax\/libs\/slick-carousel\/1.8.1\/slick.min.js\"><\/script>\r\n<script>\r\n\t\r\njQuery('.slider-for-business-partner').slick({\r\n   slidesToShow: 1,\r\n   slidesToScroll: 1,\r\n   arrows: true,\r\n\tspeed: 1000,\r\n\tfade: true,\r\n\tasNavFor: '.slider-nav'\r\n });\r\nlet slideCount = 4;\r\nlet slideShows;\r\nif(slideCount != '' ){\r\n    slideShows = slideCount;\r\n} else {\r\n    slideShows = 4\r\n}\r\njQuery('.slider-nav').slick({\r\n   slidesToShow: slideShows,\r\n   slidesToScroll: 1,\r\n   asNavFor: '.slider-for-business-partner',\r\n   dots: true,\r\n   focusOnSelect: true\r\n });\t\r\n<\/script>\r\n   \r\n  \r\n  \n<\/div><\/div>\r\n\r\n\r\n<div class=\"wp-block-cover is-light my-research-proposal\" style=\"min-height:50px;aspect-ratio:unset;\" id=\"proposal\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<div class=\"wp-block-columns my-research-proposal-columns is-layout-flex wp-container-core-columns-is-layout-5 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column my-research-proposal-left-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<h2 class=\"wp-block-heading has-text-align-left has-text-color\" id=\"h-my-securityproposal\" style=\"color:#3b5ea9;font-size:51px;font-style:normal;font-weight:600\">My Security<br>Proposal<\/h2>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.3\">Our goals for our proposal were to address the main cyber security concerns of our partner business, as well as threats we identified through SWOT analysis and the CIA triad.<\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.3\">Our plan implements multiple cyber security protocols and solutions to protect our partners, such as NordVPN Ultimate + Incognu 2-year plan, Google Workspace, and Google Drive scalability, coupled with in-depth employee training to create stronger protection for the nonprofit\u2019s data. We hope these tools will provide a multitude of facets for the nonprofit to use against potential hacks such as ad blockers, password managers, antivirus software, and data security. The Google platforms will provide a larger vat of storage for the nonprofit to hold important organizational data.\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.3\">Our proposal was successfully granted, allowing us to implement our solution for our non-profit. This will ensure that our partner is not at a high risk of physical threats, employee negligence, and hacktivists, protecting them for years to come.<\/p>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column my-research-proposal-right-column is-layout-flow wp-block-column-is-layout-flow\">    <div class=\"wp-block-bplugins-custom-html\" id='bPluginsCustomHtml-1'>\n    <div class=\"my_research_proposal\">\n  <iframe loading=\"lazy\" src=\"https:\/\/drive.google.com\/file\/d\/1Cqb8T5JXALH5kv9Trs1e6P4Q_Z68NUno\/preview\" width=\"640\" height=\"480\" allow=\"autoplay\" style=\"width: 100%; height: 100%;\"><\/iframe>\n<\/div>    <\/div>\n    <\/div>\r\n<\/div>\r\n<\/div><\/div>\r\n\r\n\r\n<div class=\"wp-block-cover is-light my-research-proposal-presentation\" style=\"min-height:50px;aspect-ratio:unset;\" id=\"presentation\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<div class=\"wp-block-columns my-research-proposal-presentation-columns is-layout-flex wp-container-core-columns-is-layout-6 wp-block-columns-is-layout-flex\">\r\n<div class=\"wp-block-column my-research-proposal-presentation-left-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:579px\">\r\n<figure class=\"wp-block-embed is-type-rich is-provider-embed-handler wp-block-embed-embed-handler wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\r\n<iframe loading=\"lazy\" title=\"2024 LI Cybersecurity &amp; Defense Internship Presentation - Capitol City Robotics Organization\" width=\"500\" height=\"281\" src=\"https:\/\/www.youtube.com\/embed\/lcbMQfhJMuA?feature=oembed&#038;enablejsapi=1&#038;origin=https:\/\/lichangesummer.org\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\r\n<\/div><\/figure>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-column my-research-proposal-presentation-right-column is-layout-flow wp-block-column-is-layout-flow\">\r\n<h2 class=\"wp-block-heading has-text-align-left has-text-color\" id=\"h-my-securityproposalpresentation\" style=\"color:#3b5ea9;font-size:51px;font-style:normal;font-weight:600\">My Security<br>Proposal<br>Presentation<\/h2>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.3\">During the Cybersecurity &#038; Defense Internship, I worked with Beth Cerrone and Jamie Kreider to learn about the basics of cybersecurity, and potential career pathways within it. \r\n<\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.3\">Throughout the week, I worked with a nonprofit to develop cybersecurity solutions to protect against various cyber threats. I worked with my team to analyze the threats to the organization, and then developed a comprehensive solution. At the end of the week, I presented my cybersecurity solution to a panel of three judges and received grant money to implement the solution.<\/p>\r\n<\/div>\r\n<\/div>\r\n<\/div><\/div>\r\n\r\n\r\n<div class=\"wp-block-cover is-light Internship-Highlights\" style=\"min-height:59px;aspect-ratio:unset;\" id=\"highlights\"><span aria-hidden=\"true\" class=\"wp-block-cover__background has-background-dim-100 has-background-dim\" style=\"background-color:#ffffff\"><\/span><div class=\"wp-block-cover__inner-container is-layout-flow wp-block-cover-is-layout-flow\">\r\n<h2 class=\"wp-block-heading has-text-align-center has-text-color\" id=\"h-internship-highlights\" style=\"color:#3e5ba9;font-size:51px;font-style:normal;font-weight:600\">Internship Highlights<\/h2>\r\n\r\n\r\n\r\n<div class=\"wp-block-atbs-tabs atbs__tabs_72c47f5a\"><ul class=\"atbs__tab-labels left make-active-tab-separate-less\" role=\"tablist\" aria-label=\"tabbed content\"><li class=\"atbs__tab-label active\" role=\"tab\" aria-selected=\"true\" aria-label=\"Security Site Tours\" tabindex=\"0\">Security Site Tours<\/li><li class=\"atbs__tab-label\" role=\"tab\" aria-selected=\"false\" aria-label=\"Nonprofit Partner Meeting\" tabindex=\"0\">Nonprofit Partner Meeting<\/li><li class=\"atbs__tab-label\" role=\"tab\" aria-selected=\"false\" aria-label=\"Working With Experts\" tabindex=\"0\">Working With Experts<\/li><li class=\"atbs__tab-label\" role=\"tab\" aria-selected=\"false\" aria-label=\"Cybersecurity Labs\" tabindex=\"0\">Cybersecurity Labs<\/li><\/ul><div class=\"atbs__tab-content\">\r\n<div class=\"wp-block-atbs-tab atbs__tab-panel\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"Security Site Tours\">\r\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2024studentsite\/wp-content\/uploads\/2024\/07\/IMG_4703.jpg\" alt=\"\" class=\"wp-image-8478 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">I was given the unique opportunity to take exclusive tours of multiple government and security sites to speak directly with security professionals. During these tours, I was able to witness first-hand how cybersecurity operates at the national and international level. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">I was given the unique opportunity to attend an embassy where I received a briefing on cultural, economic, and international situations. We also got the opportunity to ask questions about the country&#8217;s cybersecurity infrastructure; therefore, allowing me to learn about cybersecurity at an international level.\r\n<\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">We also toured the Department of Homeland Securities\u2019 Cyber Crimes Center where we received classified tours of the cyber crimes unit of the DHS and learned how Homeland Security uses cyber intelligence to track major crimes such as drug smuggling, human trafficking, and major theft. <\/p>\r\n<\/div><\/div>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-atbs-tab atbs__tab-panel\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"Business Partner Meeting\">\r\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2024studentsite\/wp-content\/uploads\/2024\/07\/IMG_4717.jpg\" alt=\"\" class=\"wp-image-8478 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">In order to apply the skills I learned throughout the internship, I worked directly with a nonprofit based in the Washington D.C. area to discuss their companies cybersecurity needs. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">After three meetings where I walked through the organization model, protected information, and staff training of the nonprofit, I worked with my team to create a staff training protocol and threat analysis for my partner. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">At the end of the internship, I advocated for, and received funding for, my nonprofit partner to implement the cybersecurity training protocols so they can best protect their client information and continue to develop with a reduced fear of cyber attacks and cybersecurity threats. <\/p>\r\n<\/div><\/div>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-atbs-tab atbs__tab-panel\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"Working With Experts\">\r\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2024studentsite\/wp-content\/uploads\/2024\/08\/Isaiah_Walker_2024_IMG_1557.png\" alt=\"\" class=\"wp-image-8478 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">To learn more about the world of cybersecurity, I was given the unique opportunity to speak directly with cybersecurity experts from multiple different organizations and backgrounds.<\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">I worked directly with one of the leading consultants in Cyber Threat Management, and a consultant for cyber policy for the National Counterintelligence Executive, Phuong Nguyen, to learn about common threat assessment and cybersecurity counterintelligence. I also heard from the global leader in Firewall Creation, David Balenson; the author of the most widely-regarded O\u2019Reilly book on cybersecurity, Michael Collins; and the lead SME for the FutureG Initiative for the Department of Defense. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">Throughout the internship, I also heard presentations from, and spoke with, representatives from the Department of Defense, Department of Homeland Security, and the National Security Agency. To learn the physical side of cybersecurity, we also had the unique opportunity to meet with globally-recognized penetration testers and network threat assessors. <\/p>\r\n<\/div><\/div>\r\n<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-atbs-tab atbs__tab-panel\" role=\"tabpanel\" tabindex=\"0\" aria-labelledby=\"Cybersecurity Labs\">\r\n<div class=\"wp-block-media-text alignwide is-stacked-on-mobile\"><figure class=\"wp-block-media-text__media\"><img decoding=\"async\" src=\"https:\/\/lichangesummer.org\/2024studentsite\/wp-content\/uploads\/2024\/08\/Isaiah_Walker_2024_IMG_1988.png\" alt=\"\" class=\"wp-image-8478 size-full\"\/><\/figure><div class=\"wp-block-media-text__content\">\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">In order to put the skills we learned to the test, I had the unique opportunity to use a cybersecurity software used for graduate instructional courses to learn a myriad of cybersecurity skills. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">Starting with network cybersecurity, I worked through labs dedicated to network security and linux to understand how networks communicate with each other and how cybersecurity poses a threat to this communication. I used these Linux skills to complete capture-the-flag coding competitions as well as virtual rooms. <\/p>\r\n\r\n\r\n\r\n<p class=\"has-custom-lineheight\" style=\"font-size:17px;font-style:normal;font-weight:300;line-height:1.2\">At the end of the internship, I worked with an expert from a leading cybersecurity consulting firm to learn how to built ethernet cables. I used ethernet cord, crimpers, and wire strippers to produce functioning ethernet cables. <\/p>\r\n<\/div><\/div>\r\n<\/div>\r\n<\/div><\/div>\r\n<\/div><\/div>\r\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":19,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"class_list":["post-18999","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v15.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>CyberIsaiahWalker - Leadership Initiatives<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lichangesummer.org\/2024studentsite\/cyberisaiahwalker\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CyberIsaiahWalker - Leadership Initiatives\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lichangesummer.org\/2024studentsite\/cyberisaiahwalker\/\" \/>\n<meta property=\"og:site_name\" content=\"Leadership Initiatives\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-12T18:26:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/cybersecurity-logo-min.png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\">\n\t<meta name=\"twitter:data1\" content=\"5 minutes\">\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lichangesummer.org\/2024studentsite\/#website\",\"url\":\"https:\/\/lichangesummer.org\/2024studentsite\/\",\"name\":\"Leadership Initiatives\",\"description\":\"Programs That Inspire Students To Transform The World\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":\"https:\/\/lichangesummer.org\/2024studentsite\/?s={search_term_string}\",\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/lichangesummer.org\/2024studentsite\/cyberisaiahwalker\/#primaryimage\",\"inLanguage\":\"en\",\"url\":\"https:\/\/lichangesummer.org\/2023\/wp-content\/uploads\/2023\/06\/cybersecurity-logo-min.png\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lichangesummer.org\/2024studentsite\/cyberisaiahwalker\/#webpage\",\"url\":\"https:\/\/lichangesummer.org\/2024studentsite\/cyberisaiahwalker\/\",\"name\":\"CyberIsaiahWalker - Leadership Initiatives\",\"isPartOf\":{\"@id\":\"https:\/\/lichangesummer.org\/2024studentsite\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lichangesummer.org\/2024studentsite\/cyberisaiahwalker\/#primaryimage\"},\"datePublished\":\"2024-06-10T19:27:45+00:00\",\"dateModified\":\"2024-08-12T18:26:50+00:00\",\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lichangesummer.org\/2024studentsite\/cyberisaiahwalker\/\"]}]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","_links":{"self":[{"href":"https:\/\/lichangesummer.org\/2024studentsite\/wp-json\/wp\/v2\/pages\/18999","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lichangesummer.org\/2024studentsite\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/lichangesummer.org\/2024studentsite\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/lichangesummer.org\/2024studentsite\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/lichangesummer.org\/2024studentsite\/wp-json\/wp\/v2\/comments?post=18999"}],"version-history":[{"count":2,"href":"https:\/\/lichangesummer.org\/2024studentsite\/wp-json\/wp\/v2\/pages\/18999\/revisions"}],"predecessor-version":[{"id":27688,"href":"https:\/\/lichangesummer.org\/2024studentsite\/wp-json\/wp\/v2\/pages\/18999\/revisions\/27688"}],"wp:attachment":[{"href":"https:\/\/lichangesummer.org\/2024studentsite\/wp-json\/wp\/v2\/media?parent=18999"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}