{"id":395,"date":"2025-04-23T23:33:31","date_gmt":"2025-04-24T04:33:31","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/brandonburke\/?page_id=395"},"modified":"2025-04-25T13:41:02","modified_gmt":"2025-04-25T18:41:02","slug":"technical-skills","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/brandonburke\/technical-skills\/","title":{"rendered":"Technical Skills"},"content":{"rendered":"\n<p>Technical skills were essential in developing a strong foundation in cybersecurity practices. In <strong>Cyber Techniques and Operations<\/strong>, I gained hands-on experience with <strong>ethical hacking<\/strong>, learning how to identify and exploit vulnerabilities in a controlled, responsible manner. In <strong>Cybersecurity Programming and Networking<\/strong>, I worked on building and securing <strong>C2 (Command and Control) servers<\/strong>, applying my programming knowledge to ensure secure communication between systems. In <strong>Linux System for Cybersecurity<\/strong>, I learned techniques like <strong>password cracking<\/strong>, using Linux tools to test system security and identify weaknesses. These courses collectively strengthened my technical expertise in various areas of cybersecurity, from hacking and networking to system security analysis.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">CYSE 301: Cyber Techniques and Operations &#8211; Ethical Hacking<\/h3>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/uploads\/sites\/34796\/2025\/04\/CYSE-301-Assignment-4-Brandon-Burke.docx-compressed.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-301-Assignment-4-Brandon-Burke.docx-compressed<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">CYSE 250: Cybersecurity Programming and Networking &#8211; C2 Server<\/h3>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/uploads\/sites\/34796\/2025\/04\/Command-and-Control-Report-Brandon-Burke-compressed.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Command-and-Control-Report-Brandon-Burke-compressed<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">CYSE 270: Linux System for Cybersecurity &#8211; Password Cracking<\/h3>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-content\/uploads\/sites\/34796\/2025\/04\/Assignment-5-Brandon-Burke.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Assignment-5-Brandon-Burke<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Technical skills were essential in developing a strong foundation in cybersecurity practices. In Cyber Techniques and Operations, I gained hands-on experience with ethical hacking, learning how to identify and exploit vulnerabilities in a controlled, responsible manner. In Cybersecurity Programming and&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/brandonburke\/technical-skills\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":24541,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/pages\/395"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/users\/24541"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/comments?post=395"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/pages\/395\/revisions"}],"predecessor-version":[{"id":453,"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/pages\/395\/revisions\/453"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/brandonburke\/wp-json\/wp\/v2\/media?parent=395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}