Skip to content

brandon-pearson

Brandon Pearson

  • Home
  • Resume
  • Skills
    • Foundational understanding of Python
    • Sufficient with Linux command line
    • Understand Policies and Ethics
  • Cybersecurity Foundations
    • CYSE 270 – Linux System for Cybersecurity
      • Assignment: Create a Virtual machine
      • Participation Activity-1
      • Assignment – Working on the Command Line
      • Assignment-3-Working with vi editor
      • Assignment-4-Group-and-User-management
      • Assignment-5-Password Cracking
      • Assignment-6-File Permissions
      • Assignment-7-Storage Management
      • Assignment-8-Shell script
      • Assignment-9-Automation Task and Shell Scripting
      • Assignment-10-Networking Basics
      • Assignment-11-Basic Network Configuration
    • IT 201- INTRO TO INFORMATION SYSTEMS
      • E-Business Assignment
      • IT Infrastructure: Hardware and Software Assignment
      • Ethical and Social Issues in Information Systems Assignment
      • Securing Information Systems Assignment
      • Databases and Business Intelligence Assignment
      • Achieving Operational Excellence and Customer Intimacy: Enterprise Applications Assignment
      • E-Commerce and Digital Goods Assignment
      • Improved Decision Making with Information Systems Assignment
      • Critical Thinking Assignment
    • CYSE 201S – Cybersecurity as a Social Science 
      • Journal Entries:
      • Article Review 1:
      • Article Review 2:
      • Career Paper:
    • CYSE 250 – Basic Programming & Networking
      • Assignment 1- Case study & OSI model
      • Assignment 2-IP address and Subnetting
      • Assignment-3-Installing Cisco Packet Tracer
      • Assignment-4-Strings and List
      • Assignment-5-Data Type and List
      • Assignment-6-Tuple, Functions and Module in Python
      • Assignment-7-Using If-Condition and Loops in Python
      • Assignment-8-While Loop in Python
      • Participation Activity-Week-11 -Creating a chat system using socket
      • Assignment-9-Socket Programming
    • CYSE 300 – Introduction to Cybersecurity
      • Short Research Paper #1
      • Short Research Paper #2
    • CYSE 301 – Cybersecurity Techniques and Operations
      • Assignment #1 – Basic Linux Commands
      • Assignment #2 – Traffic Tracing and Sniffing
      • Assignment #3 – Sword vs. Shield
      • Assignment #4 – Ethical Hacking
      • Assignment #5 – Password Cracking
      • Assignment 6 – Hide your secret!
  • Tech & Society
    • IT/CYSE 200T – Cybersecurity, Technology, and Society
      • Journal Entries
    • IDS 300W – Interdisciplinary Theory & Concepts
      • Writing Workshop 1
      • Writing Workshop 2
      • Writing Workshop 3
      • Writing Workshop 4
      • Term Research Paper 
    • CS 462 – Cybersecurity Fundamentals
      • CS 462: SolarWinds Orion Compromise
  • Law & Ethics
    • CYSE 406 – Cyber Law
      • Assignment 1: Privacy Laws in The State of Mongo
      • Writing Assignment 2
    • PHIL 355E – Cybersecurity Ethics
      • Reflective Paper
      • Case Analysis on Professional Ethics
      • Case Analysis on User Data
    • CYSE 425w – Cybersecurity Strategy and Policy
      • Policy Analysis Paper 1
      • Policy Analysis Paper 2 
      • Policy Analysis Paper 3
      • Policy Analysis Paper 4
      • Policy Analysis Paper 5
      • Midterm Assignment
  • Cybersecurity Applications
    • CYSE 407 – Digital Forensics
      • Final: Report
      • Discussion page:
    • CYSE 494 – Entrepreneurship in Cybersecurity
      • A Critical Analysis of Business Failures
      • Individual Ideas Assessment
      • Interview an Entrepreneur
      • Business Plan
      • Discussion Page:
    • CS 463 – CRYPTOGRAPHY FOR CYBERSECURITY
      • Python Coding Project: RSA Encryption & Caesar cipher
      • Homework 2: Modular arithmetic
      • Homework 3- DES Algorithm / Linear Feedback Shift Register
      • Homework 5- ECB, CBC, OFB, CFB, CTR
      • Homework 6 – Fermat’s little theorem & Euler’s theorem
      • Homework 7 -Elgamal encryption scheme / Diffie-Hellman key exchange protocol
      • Homework 11 – Martyas-Meyer-Oseas, Davis-Meyer, and Migayuchi-Preneel Hash Functions
      • Homework 12 – Key Distribution Center
    • CS 465 -Information Assurance
      • Homework-01
      • Homework-02
      • Homework-03
      • Homework-04
      • Homework-05
      • Homework-06
      • Homework-10
      • Homework-11
      • Homework-12
    • CYSE 450 -Ethical Hacking and Penetration Testing 
      • Performance Report / Labs
  • Blog
  • Contacts
  • IDS 493

Author: bpear003

Assignment-6-File Permissions

Assignment-5-Password Cracking

Assignment-4-Group-and-User-management

Assignment-4-Group-and-User-management

Assignment-3-Working with vi editor

Assignment – Working on the Command Line

Assignment: Create a Virtual machine

Critical Thinking Assignment

Improved Decision Making with Information Systems Assignment

E-Commerce and Digital Goods Assignment

Posts navigation

Older posts
Newer posts
Proudly powered by WordPress | Theme: Dyad by WordPress.com.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept