Skip to content
brandon-pearson
Brandon Pearson
Menu
Home
Resume
Skills
Foundational understanding of Python
Sufficient with Linux command line
Understand Policies and Ethics
Cybersecurity Foundations
CYSE 270 – Linux System for Cybersecurity
Assignment: Create a Virtual machine
Participation Activity-1
Assignment – Working on the Command Line
Assignment-3-Working with vi editor
Assignment-4-Group-and-User-management
Assignment-5-Password Cracking
Assignment-6-File Permissions
Assignment-7-Storage Management
Assignment-8-Shell script
Assignment-9-Automation Task and Shell Scripting
Assignment-10-Networking Basics
Assignment-11-Basic Network Configuration
IT 201- INTRO TO INFORMATION SYSTEMS
E-Business Assignment
IT Infrastructure: Hardware and Software Assignment
Ethical and Social Issues in Information Systems Assignment
Securing Information Systems Assignment
Databases and Business Intelligence Assignment
Achieving Operational Excellence and Customer Intimacy: Enterprise Applications Assignment
E-Commerce and Digital Goods Assignment
Improved Decision Making with Information Systems Assignment
Critical Thinking Assignment
CYSE 201S – Cybersecurity as a Social Science
Journal Entries:
Article Review 1:
Article Review 2:
Career Paper:
CYSE 250 – Basic Programming & Networking
Assignment 1- Case study & OSI model
Assignment 2-IP address and Subnetting
Assignment-3-Installing Cisco Packet Tracer
Assignment-4-Strings and List
Assignment-5-Data Type and List
Assignment-6-Tuple, Functions and Module in Python
Assignment-7-Using If-Condition and Loops in Python
Assignment-8-While Loop in Python
Participation Activity-Week-11 -Creating a chat system using socket
Assignment-9-Socket Programming
CYSE 300 – Introduction to Cybersecurity
Short Research Paper #1
Short Research Paper #2
CYSE 301 – Cybersecurity Techniques and Operations
Assignment #1 – Basic Linux Commands
Assignment #2 – Traffic Tracing and Sniffing
Assignment #3 – Sword vs. Shield
Assignment #4 – Ethical Hacking
Assignment #5 – Password Cracking
Assignment 6 – Hide your secret!
Tech & Society
IT/CYSE 200T – Cybersecurity, Technology, and Society
Journal Entries
IDS 300W – Interdisciplinary Theory & Concepts
Writing Workshop 1
Writing Workshop 2
Writing Workshop 3
Writing Workshop 4
Term Research Paper
CS 462 – Cybersecurity Fundamentals
CS 462: SolarWinds Orion Compromise
Law & Ethics
CYSE 406 – Cyber Law
Assignment 1: Privacy Laws in The State of Mongo
Writing Assignment 2
PHIL 355E – Cybersecurity Ethics
Reflective Paper
Case Analysis on Professional Ethics
Case Analysis on User Data
CYSE 425w – Cybersecurity Strategy and Policy
Policy Analysis Paper 1
Policy Analysis Paper 2
Policy Analysis Paper 3
Policy Analysis Paper 4
Policy Analysis Paper 5
Midterm Assignment
Cybersecurity Applications
CYSE 407 – Digital Forensics
Final: Report
Discussion page:
CYSE 494 – Entrepreneurship in Cybersecurity
A Critical Analysis of Business Failures
Individual Ideas Assessment
Interview an Entrepreneur
Business Plan
Discussion Page:
CS 463 – CRYPTOGRAPHY FOR CYBERSECURITY
Python Coding Project: RSA Encryption & Caesar cipher
Homework 2: Modular arithmetic
Homework 3- DES Algorithm / Linear Feedback Shift Register
Homework 5- ECB, CBC, OFB, CFB, CTR
Homework 6 – Fermat’s little theorem & Euler’s theorem
Homework 7 -Elgamal encryption scheme / Diffie-Hellman key exchange protocol
Homework 11 – Martyas-Meyer-Oseas, Davis-Meyer, and Migayuchi-Preneel Hash Functions
Homework 12 – Key Distribution Center
CS 465 -Information Assurance
Homework-01
Homework-02
Homework-03
Homework-04
Homework-05
Homework-06
Homework-10
Homework-11
Homework-12
CYSE 450 -Ethical Hacking and Penetration Testing
Performance Report / Labs
Blog
Contacts
IDS 493
Final: Report
annotated-final.docx
Download
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
Accept