{"id":123,"date":"2025-01-16T15:58:08","date_gmt":"2025-01-16T15:58:08","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2026-05-04T15:05:12","modified_gmt":"2026-05-04T15:05:12","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/cyse-301\/","title":{"rendered":"CYSE 301"},"content":{"rendered":"<h1 style=\"text-align: center\">Cybersecurity Techniques and Operations<\/h1>\n<p><strong>Course Material<\/strong><\/p>\n<p class=\"p1\">Throughout this course, I developed a strong foundation in both <span class=\"s2\"><b>c<\/b>ybersecurity operations and C programming<\/span><span class=\"s1\">, combining technical implementation with analytical thinking. The coursework included programming assignments, hands-on cybersecurity labs, and research papers, all of which contributed to my ability to understand, apply, and communicate key security concepts in a professional context.<\/span><\/p>\n\n<a href=\"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2026\/05\/Assignment-1-Basic-Linux-Commands-Celeste-Meraz-Luna.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Assignment-1-Basic-Linux-Commands-Celeste-Meraz-Luna<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2026\/05\/Assignment-2-Traffic-Tracing-and-Sniffing.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Assignment-2-Traffic-Tracing-and-Sniffing<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2026\/05\/Assignment-3-Sword-Celeste-Meraz-Luna.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Assignment-3-Sword-Celeste-Meraz-Luna<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2026\/05\/Assignment-4-Ethical-Hacking-Celeste-Meraz-Luna.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Assignment-4-Ethical-Hacking-Celeste-Meraz-Luna<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2026\/05\/Assignment-6-Celeste-Meraz-Luna.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Assignment-6-Celeste-Meraz-Luna<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Overall, this course provided a comprehensive learning experience that combined technical programming skills with applied cybersecurity practices. By completing both coding assignments and hands-on labs, I gained a well-rounded understanding of how systems operate, how they can be attacked, and how they can be secured. This integrated knowledge base will be essential as I continue to grow within the cybersecurity field.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Techniques and Operations Course Material Throughout this course, I developed a strong foundation in both cybersecurity operations and C programming, combining technical implementation with analytical thinking. The coursework included programming assignments, hands-on cybersecurity labs, and research papers, all of which contributed to my ability to understand, apply, and communicate key security concepts in a&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/celestemerazluna\/cyse-301\/\">Read More<\/a><\/div>\n","protected":false},"author":30333,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/users\/30333"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":437,"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/pages\/123\/revisions\/437"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}