{"id":123,"date":"2022-09-01T03:34:17","date_gmt":"2022-09-01T03:34:17","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2024-04-20T20:29:39","modified_gmt":"2024-04-20T20:29:39","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/cyse-301\/","title":{"rendered":"CYSE 301 &#8211; Cybersecurity Techniques and Operations"},"content":{"rendered":"<h1 style=\"text-align: center\">Cybersecurity Techniques and Operations<\/h1>\n<p>This course introduces tools and techniques used to secure and analyze large computer networks and systems. Students will systematically learn C programming in the first part of the course, which forms a foundation for many cybersecurity operations, such as malware analysis, understanding network protocol stack, etc. In the second part, students will explore and map networks using a variety of diagnostic software tools, learn advanced packet analysis, configure firewalls, write intrusion detection rules, perform forensic investigation, and practice techniques for penetration testing. The objectives are:<\/p>\n<ul>\n<li>Understand the concepts and major constructs of the C programming language,<\/li>\n<li>Master the programming skills of the C programming language,<\/li>\n<li>Be able to analyze the C source code to infer the functionality of a given code segment, C function, C program etc,<\/li>\n<li>Grasp the needed techniques and skills to write a C program in cybersecurity operations such as a network protocol stack,<\/li>\n<li>Monitor and analyze network traffic. Identify and trace the traffic when intrusion is detected in the network,<\/li>\n<li>Identify and evaluate the vulnerabilities in the network and implement effective countermeasures to protect the network,<\/li>\n<li>Master the technologies to exploit the vulnerabilities in a remote system,<\/li>\n<li>Analyze the vulnerabilities in wireless communication network,<\/li>\n<li>Manage data and personal information in a secure manner.<\/li>\n<\/ul>\n<h1>Course Material<\/h1>\n<p>There are both programming assignments for C programming and hands-on labs for cybersecurity and operations.<\/p>\n<p>The programming assignments are as follows:<\/p>\n<ol>\n<li>Write a function htoi(s), which concerts a string of hexadecimal digits into its equivalent integer value.<\/li>\n<li>Write a function any(s1, s2) that returns the first location in the string s1 where any character from the string s2 occurs, or -1 if s1 contains no characters from s2.<\/li>\n<li>Using pointer, write a function strcat(s, t) that copies string t to the end of string s<\/li>\n<li>Write a program expr, which evaluates a reverse Polish expression from the command line. For example expr 2 3 4 + * evaluates 2* (3 + 4).<\/li>\n<li>Write a program to compare two files, printing the first line where they differ.<\/li>\n<\/ol>\n<p>The hands-on labs are as follows:<\/p>\n<ol>\n<li>Traffic tracing through Wireshark and TCPdump<\/li>\n<li>Firewall configuration with pfSense<\/li>\n<li>Penetration test on Windows<\/li>\n<li>Password cracking<\/li>\n<li>Information hiding<\/li>\n<\/ol>\n<p class=\"p1\">\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Techniques and Operations This course introduces tools and techniques used to secure and analyze large computer networks and systems. Students will systematically learn C programming in the first part of the course, which forms a foundation for many cybersecurity operations, such as malware analysis, understanding network protocol stack, etc. In the second part, students&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/brandon-pearson\/cyse-301\/\">Read More<\/a><\/div>\n","protected":false},"author":24668,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/users\/24668"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":648,"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/pages\/123\/revisions\/648"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/brandon-pearson\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}