{"id":148,"date":"2024-06-11T15:00:28","date_gmt":"2024-06-11T15:00:28","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/aaronjones\/?page_id=148"},"modified":"2025-03-17T03:24:14","modified_gmt":"2025-03-17T03:24:14","slug":"cyse301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/aaronjones\/cyse301\/","title":{"rendered":"CYSE 301 &#8211; Cybersecurity Techniques and OperationsCYSE301"},"content":{"rendered":"\n<p>This course introduces tools and techniques for securing and analyzing large computer networks and systems. I was able to explore and map networks using various diagnostic software tools, learn advanced packet analysis, configure firewalls, write intrusion detection rules, perform forensic investigations, and practice penetration testing techniques.<\/p>\n\n\n\n<p>Assignment #1 &#8211; Basic Linux Commands<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-afb3e1d9-acf0-447f-ab2a-1c8bc525bb8b\" href=\"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-content\/uploads\/sites\/34168\/2024\/06\/Basic-Linux-Commands.docx\">Basic-Linux-Commands<\/a><a href=\"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-content\/uploads\/sites\/34168\/2024\/06\/Basic-Linux-Commands.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-afb3e1d9-acf0-447f-ab2a-1c8bc525bb8b\">Download<\/a><\/div>\n\n\n\n<p>Assignment #7 &#8211; Make your own VPN server<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-content\/uploads\/sites\/34168\/2024\/06\/annotated-VPN.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-VPN.docx.\"><\/object><a id=\"wp-block-file--media-24ccf67f-5e25-4178-baa0-96814bd8e48d\" href=\"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-content\/uploads\/sites\/34168\/2024\/06\/annotated-VPN.docx.pdf\">annotated-VPN.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-content\/uploads\/sites\/34168\/2024\/06\/annotated-VPN.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-24ccf67f-5e25-4178-baa0-96814bd8e48d\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>This course introduces tools and techniques for securing and analyzing large computer networks and systems. I was able to explore and map networks using various diagnostic software tools, learn advanced packet analysis, configure firewalls, write intrusion detection rules, perform forensic investigations, and practice penetration testing techniques. Assignment #1 &#8211; Basic Linux Commands Assignment #7 &#8211; &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/aaronjones\/cyse301\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CYSE 301 &#8211; Cybersecurity Techniques and OperationsCYSE301<\/span><\/a><\/p>\n","protected":false},"author":25292,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/pages\/148"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/users\/25292"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/comments?post=148"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/pages\/148\/revisions"}],"predecessor-version":[{"id":248,"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/pages\/148\/revisions\/248"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/aaronjones\/wp-json\/wp\/v2\/media?parent=148"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}