{"id":486,"date":"2025-08-09T20:12:01","date_gmt":"2025-08-09T20:12:01","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/bryantcyse200\/?page_id=486"},"modified":"2026-04-09T16:41:26","modified_gmt":"2026-04-09T16:41:26","slug":"computer-programming","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/bryantcyse200\/top-skills\/computer-programming\/","title":{"rendered":"Cybersecurity Operations and Techniques"},"content":{"rendered":"\n<p class=\"has-text-align-center\">This page contains much of my work in Cyber Operations and Techniques. I have taken multiple courses on this subject matter and it is one of my greatest strengths!<\/p>\n\n\n\n<p class=\"has-text-align-left\"><strong>CYSE 301 &#8211; Cyber Operations and Techniques<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Firewall configuration and Network scanning activities<\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-content\/uploads\/sites\/15646\/2026\/04\/Assignment-3-Sword-vs-compressed.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Assignment-3-Sword-vs-compressed<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Steganography<\/strong><\/p>\n\n\n\n<p>&#8220;Assignment Task: <\/p>\n\n\n\n<ol>\n<li>Create a text file containing the answers to the following questions:<\/li>\n<\/ol>\n\n\n\n<ul>\n<li>What are your name and current date and timestamp?<\/li>\n\n\n\n<li>What is your expected grade in this course?<\/li>\n<\/ul>\n\n\n\n<ol>\n<li>Use steghide to hide this text file in the cover image, &#8221; monarch.bmp.&#8221;<\/li>\n<\/ol>\n\n\n\n<ul>\n<li>Use your own UIN as the password for encryption, for example, 01000123.<\/li>\n\n\n\n<li>Use your Midas ID (all lowercase) as the name of the STEGO file, for example<br>(&#8220;pjian123.bmp&#8221;).<\/li>\n<\/ul>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-content\/uploads\/sites\/15646\/2026\/04\/bwatk008.png\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"229\" src=\"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-content\/uploads\/sites\/15646\/2026\/04\/bwatk008.png\" alt=\"\" class=\"wp-image-633\" \/><\/a><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>VPN Server Configuration<\/strong><\/p>\n\n\n\n<p>&#8220;Assignment directions:<\/p>\n\n\n\n<ol>\n<li>Create a Linux Instance on GCP named&nbsp;vpn-301-YourMIDAS (show the IP address and region assigned for the VM).&nbsp;<\/li>\n\n\n\n<li>Configure the server and generate a client named &#8220;yourMidas_vpn.ovpn&#8221; and download it from the server.&nbsp;<\/li>\n\n\n\n<li>Connect to your VPN server from a laptop or cell phone client and show the public IP address returned from the website&nbsp;<a href=\"https:\/\/whatismyipaddress.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">&#8220;What is My IP address<\/a>&#8220;<\/li>\n<\/ol>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-content\/uploads\/sites\/15646\/2026\/04\/CYSE-301-VPN-Server.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-301-VPN-Server<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><strong>CYSE 601 &#8211; Advanced Cyber Operations and Techniques<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Kali Linux Tools and Operations<\/strong><\/p>\n\n\n\n<p>Tasks<strong>:<\/strong><\/p>\n\n\n\n<ol>\n<li>Screenshots of the Linux command line showing the executed commands and their outputs.<\/li>\n\n\n\n<li>Screenshots of the IP address acquisition on each VM and the Nmap scan results.<\/li>\n\n\n\n<li>Descriptions and usage examples\/screenshots for the three Kali Linux tools explored.<\/li>\n<\/ol>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-content\/uploads\/sites\/15646\/2026\/04\/CYSE-601-Lab-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-601-Lab-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Firewall Configuration<\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-content\/uploads\/sites\/15646\/2026\/04\/CYSE-601-PFSENSE-LAB.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-601-PFSENSE-LAB<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>SNORT<\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-content\/uploads\/sites\/15646\/2026\/04\/CYSE-601-SNORT-Lab-Report-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-601-SNORT-Lab-Report-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p class=\"has-text-align-center\"><strong>Wireshark<\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-content\/uploads\/sites\/15646\/2026\/04\/CYSE-601-Wireshark-Lab-Report-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-601-Wireshark-Lab-Report-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This page contains much of my work in Cyber Operations and Techniques. I have taken multiple courses on this subject matter and it is one of my greatest strengths! CYSE 301 &#8211; Cyber Operations and Techniques Firewall configuration and Network scanning activities Steganography &#8220;Assignment Task: VPN Server Configuration &#8220;Assignment directions: CYSE 601 &#8211; Advanced Cyber&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/bryantcyse200\/top-skills\/computer-programming\/\">Read More<\/a><\/div>\n","protected":false},"author":14867,"featured_media":0,"parent":438,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-json\/wp\/v2\/pages\/486"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-json\/wp\/v2\/users\/14867"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-json\/wp\/v2\/comments?post=486"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-json\/wp\/v2\/pages\/486\/revisions"}],"predecessor-version":[{"id":661,"href":"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-json\/wp\/v2\/pages\/486\/revisions\/661"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-json\/wp\/v2\/pages\/438"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/bryantcyse200\/wp-json\/wp\/v2\/media?parent=486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}