{"id":191,"date":"2025-11-19T18:06:22","date_gmt":"2025-11-19T18:06:22","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/acuff\/?page_id=191"},"modified":"2025-12-05T19:12:28","modified_gmt":"2025-12-05T19:12:28","slug":"cybersecurity-applications","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/acuff\/skills\/cybersecurity-applications\/","title":{"rendered":"Cybersecurity Applications"},"content":{"rendered":"\n<div class=\"wp-block-query is-layout-flow wp-block-query-is-layout-flow\"><ul class=\"columns-3 wp-block-post-template is-layout-grid wp-container-core-post-template-layout-1 wp-block-post-template-is-layout-grid\"><li class=\"wp-block-post post-219 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/acuff\/2025\/12\/05\/skills-involving-cybersecurity-3\/\" target=\"_self\" >Skills Involving Cybersecurity #3<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Skill 3: Malware Prevention and Detection Supporting Artifact 1:&nbsp;Learning about Malware and Other Types of Attacks Brief Description:\u00a0Of course, in order to do cybersecurity, you have to know what you&#8217;re getting into with the field. The module for this topic discussed what malware was, other type of attacks similar to it, and the attacker&#8217;s motivation\/tactics&#8230;.&hellip;<\/p><p class=\"wp-block-post-excerpt__more-text\"><a class=\"wp-block-post-excerpt__more-link\" href=\"https:\/\/sites.wp.odu.edu\/acuff\/2025\/12\/05\/skills-involving-cybersecurity-3\/\"><a href=\"https:\/\/sites.wp.odu.edu\/acuff\/blog\/\">Blog | acuff<\/a><\/a><\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-12-05T18:50:43+00:00\">December 5, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-210 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/acuff\/2025\/12\/05\/skills-involving-cybersecurity-2\/\" target=\"_self\" >Skills Involving Cybersecurity #2<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Skill 2: Understanding Operating Systems Supporting Artifact 1:&nbsp; Knowing how to use Linux Brief Description:\u00a0In half of my cybersecurity classes, I was required to install and learn how to work the Linux virtual machine for my assignments.\u00a0(Document below is an example of my knowledge of how to use Linux) Supporting Artifact 2:&nbsp; Taking a Class&#8230;&hellip;<\/p><p class=\"wp-block-post-excerpt__more-text\"><a class=\"wp-block-post-excerpt__more-link\" href=\"https:\/\/sites.wp.odu.edu\/acuff\/2025\/12\/05\/skills-involving-cybersecurity-2\/\"><a href=\"https:\/\/sites.wp.odu.edu\/acuff\/blog\/\">Blog | acuff<\/a><\/a><\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-12-05T18:34:52+00:00\">December 5, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><li class=\"wp-block-post post-171 post type-post status-publish format-standard hentry category-uncategorized\">\n\n<div class=\"wp-block-group is-layout-flow wp-block-group-is-layout-flow\" style=\"padding-top:30px;padding-right:30px;padding-bottom:30px;padding-left:30px\"><div class=\"wp-block-group__inner-container\"><h2 class=\"wp-block-post-title\"><a href=\"https:\/\/sites.wp.odu.edu\/acuff\/2025\/11\/18\/hello-world\/\" target=\"_self\" >Skills Involving Cybersecurity<\/a><\/h2>\n\n<div class=\"wp-block-post-excerpt\"><p class=\"wp-block-post-excerpt__excerpt\">Skill 1: Familiarity with Virtual Machines&nbsp; Supporting Artifact 1:&nbsp; My Module 9 Lab from CS 562 Brief Description: Within the lab, we had to answer 5 questions about the C program codes for exploits. Supporting Artifact 2:&nbsp; Firewall setup &amp; Network scanning Brief Description:&nbsp;In my CYSE 301 class, we learned in module 2 what a&#8230;&hellip;<\/p><p class=\"wp-block-post-excerpt__more-text\"><a class=\"wp-block-post-excerpt__more-link\" href=\"https:\/\/sites.wp.odu.edu\/acuff\/2025\/11\/18\/hello-world\/\"><a href=\"https:\/\/sites.wp.odu.edu\/acuff\/blog\/\">Blog | acuff<\/a><\/a><\/p><\/div>\n\n<div class=\"wp-block-post-date\"><time datetime=\"2025-11-18T20:51:01+00:00\">November 18, 2025<\/time><\/div><\/div><\/div>\n\n<\/li><\/ul><\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":25753,"featured_media":0,"parent":190,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/pages\/191"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/users\/25753"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/comments?post=191"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/pages\/191\/revisions"}],"predecessor-version":[{"id":233,"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/pages\/191\/revisions\/233"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/pages\/190"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/acuff\/wp-json\/wp\/v2\/media?parent=191"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}