{"id":476,"date":"2025-08-09T19:35:17","date_gmt":"2025-08-09T19:35:17","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/bryantcyse200\/?page_id=476"},"modified":"2026-04-09T14:40:37","modified_gmt":"2026-04-09T14:40:37","slug":"ethical-hacking-and-penetration-testing","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/bryantcyse200\/top-skills\/ethical-hacking-and-penetration-testing\/","title":{"rendered":"Ethical Hacking and Penetration Testing"},"content":{"rendered":"\n<p class=\"has-text-align-center\">CYSE 301 &#8211; These assignments showcase my ability to successfully execute password cracking and various other ethical hacking activities<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-content\/uploads\/sites\/15646\/2025\/08\/PasswordCrack.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">PasswordCrack<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-content\/uploads\/sites\/15646\/2025\/08\/EthHackAssign.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">EthHackAssign<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>CYSE 450 &#8211; Lab 4: This assignment showcases my ability to successfully create hashing strings<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-content\/uploads\/sites\/15646\/2025\/08\/optimized_cyse_450_-_lab_4.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">optimized_cyse_450_-_lab_4<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>CYSE 450 &#8211; Lab 5: This assignment showcases my ability to successfully execute an SQL Injection attack<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-content\/uploads\/sites\/15646\/2025\/08\/CYSE-450-Lab-5.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-450-Lab-5<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>CYSE 625 &#8211; Lab Report: This report illustrates my excellent performance in completing ACI Learning Ethical Hacking and Systems Defense Skill Labs <\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-content\/uploads\/sites\/15646\/2026\/03\/CYSE-625-Lab-5-Report.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-625-Lab-5-Report<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>CYSE 601 &#8211; Ethical Hacking Lab: This report demonstrates my successful exploitation of a Windows server 2008 machine. Numerous tools utilized include the following &#8211; Nmap, Shodan, and Metasploit.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-content\/uploads\/sites\/15646\/2026\/03\/CYSE-601-Ethical-Hacking-Lab.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-601-Ethical-Hacking-Lab<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>CYSE 601 &#8211; Wi-Fi Password Cracking: This report demonstrates my successful password cracking of WEP and WPA2 Wi-Fi networks<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-content\/uploads\/sites\/15646\/2026\/04\/CYSE-601-WiFi-Password-Cracking-Lab-Report.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-601-WiFi-Password-Cracking-Lab-Report<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CYSE 301 &#8211; These assignments showcase my ability to successfully execute password cracking and various other ethical hacking activities CYSE 450 &#8211; Lab 4: This assignment showcases my ability to successfully create hashing strings CYSE 450 &#8211; Lab 5: This assignment showcases my ability to successfully execute an SQL Injection attack CYSE 625 &#8211; Lab&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/bryantcyse200\/top-skills\/ethical-hacking-and-penetration-testing\/\">Read More<\/a><\/div>\n","protected":false},"author":14867,"featured_media":0,"parent":438,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-json\/wp\/v2\/pages\/476"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-json\/wp\/v2\/users\/14867"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-json\/wp\/v2\/comments?post=476"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-json\/wp\/v2\/pages\/476\/revisions"}],"predecessor-version":[{"id":623,"href":"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-json\/wp\/v2\/pages\/476\/revisions\/623"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-json\/wp\/v2\/pages\/438"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-json\/wp\/v2\/media?parent=476"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}