{"id":123,"date":"2024-01-10T20:30:44","date_gmt":"2024-01-10T20:30:44","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2024-12-16T19:21:25","modified_gmt":"2024-12-16T19:21:25","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/abcyber\/cyse-301\/","title":{"rendered":"CYSE 301"},"content":{"rendered":"<h1 style=\"text-align: center\">Cybersecurity Techniques and Operations<\/h1>\n<p><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">This course<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">focuses on<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">tools and techniques<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">involved<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">in<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">real<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">&#8211;<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">world cyber<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">operation<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">s<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">It<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">provides<\/span>\u00a0<span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">a broad range of cybersecurity concepts and essential hands-on training for students who want to become cybersecurity professional<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">s<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">.<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">Students will learn the basic<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">cybersecurity dis<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ci<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">pline,<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">underline the<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\"> model computing envir<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">on<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">ment, and practice different tools and<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">strategies<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">to perform cyber<\/span><br class=\"textLayer--absolute\" role=\"presentation\" \/><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">attacks<\/span> <span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">and defense operations<\/span><span class=\"textLayer--absolute\" dir=\"ltr\" role=\"presentation\">. The following are the course objectives:<br \/><\/span><\/p>\n<ul>\n<li>Understand the rules and laws involved in real-world cyber operations,<\/li>\n<li>Understand the basic components of the model computing networks and take different<br \/>techniques to identify and trace the network traffic if an instruction is detected inside a<br \/>network,<\/li>\n<li>Identify and evaluate the vulnerabilities in the network and implement effective countermeasures to protect the network from possible attacks,<\/li>\n<li>Understand how to plan, organize, and perform penetration testing on a network,<\/li>\n<li>Understand different cryptographic protocols, tools, and mechanisms used for different<br \/>systems and exploit their weaknesses accordingly,<\/li>\n<li>Manage data and personal information in a secure manner.<\/li>\n<\/ul>\n<h1>Course Material<\/h1>\n<p>This course required the completion of six hands-on lab assignments, which are as follows:<\/p>\n<ol>\n<li>Review of Linux commands<\/li>\n<li>Traffic capture and analysis using Wireshark<\/li>\n<li>Network scanning and firewall configuration<\/li>\n<li>Ethical hacking using Metasploit<\/li>\n<li>Password cracking using John the Ripper and aircrack-ng<\/li>\n<li>Digital steganography and hiding information with steghide<\/li>\n<\/ol>\n<p class=\"p1\">\n\n\n<h1 class=\"wp-block-heading\">Examples of Course Work<\/h1>\n\n\n\n<h3 class=\"wp-block-heading\">Example 1<\/h3>\n\n\n<b>PDF Embedder requires a url attribute<\/b>\n\n\n<h3 class=\"wp-block-heading\">Example 2<\/h3>\n\n\n<b>PDF Embedder requires a url attribute<\/b>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Techniques and Operations This course focuses on tools and techniques involved in real&#8211;world cyber operations. It provides\u00a0a broad range of cybersecurity concepts and essential hands-on training for students who want to become cybersecurity professionals. Students will learn the basic cybersecurity discipline, underline the model computing environment, and practice different tools and strategies to perform&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/abcyber\/cyse-301\/\">Read More<\/a><\/div>\n","protected":false},"author":26635,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/users\/26635"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":416,"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/pages\/123\/revisions\/416"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}