{"id":372,"date":"2024-04-18T14:49:39","date_gmt":"2024-04-18T14:49:39","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/christian-carrion\/?page_id=372"},"modified":"2024-04-18T14:49:39","modified_gmt":"2024-04-18T14:49:39","slug":"cyse-450-works","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/christian-carrion\/cyse-450-works\/","title":{"rendered":"CYSE 450 Works"},"content":{"rendered":"\n<p>Lab 2 Assignment: Introduction to Ethical Hacking and Penetration Testing <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Lab201-20Introduction20to20Ethical20Hacking.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Lab201-20Introduction20to20Ethical20Hacking.\"><\/object><a id=\"wp-block-file--media-73f39816-f12e-4da6-9e87-e0f17b6f4901\" href=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Lab201-20Introduction20to20Ethical20Hacking.pdf\">annotated-Lab201-20Introduction20to20Ethical20Hacking<\/a><a href=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Lab201-20Introduction20to20Ethical20Hacking.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-73f39816-f12e-4da6-9e87-e0f17b6f4901\">Download<\/a><\/div>\n\n\n\n<p>Lab 3 Assignment: Passive Reconnaissance<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Assignment-3-CYSE20450.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Assignment-3-CYSE20450.\"><\/object><a id=\"wp-block-file--media-631c46e1-74fe-4f7a-a5f1-a1bfe5368294\" href=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Assignment-3-CYSE20450.pdf\">annotated-Assignment-3-CYSE20450<\/a><a href=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Assignment-3-CYSE20450.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-631c46e1-74fe-4f7a-a5f1-a1bfe5368294\">Download<\/a><\/div>\n\n\n\n<p>Lab 4 Assignment: Active Reconnaissance and Foot Printing<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Assignment-4-CYSE45020-20Spring2024.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Assignment-4-CYSE45020-20Spring2024.docx.\"><\/object><a id=\"wp-block-file--media-d94b0b3a-065c-4592-8de8-907253cf0ca2\" href=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Assignment-4-CYSE45020-20Spring2024.docx.pdf\">annotated-Assignment-4-CYSE45020-20Spring2024.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Assignment-4-CYSE45020-20Spring2024.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-d94b0b3a-065c-4592-8de8-907253cf0ca2\">Download<\/a><\/div>\n\n\n\n<p>Lab 5 Assignment: Malware Attack and Cryptography<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Lab-5-CYSE450-Malware20Attack20and20Cryptography.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Lab-5-CYSE450-Malware20Attack20and20Cryptography.docx.\"><\/object><a id=\"wp-block-file--media-ca31e575-0e0f-4e08-a3b2-f9565b39162d\" href=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Lab-5-CYSE450-Malware20Attack20and20Cryptography.docx.pdf\">annotated-Lab-5-CYSE450-Malware20Attack20and20Cryptography.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Lab-5-CYSE450-Malware20Attack20and20Cryptography.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-ca31e575-0e0f-4e08-a3b2-f9565b39162d\">Download<\/a><\/div>\n\n\n\n<p>Lab 6 Assignment: Steganography<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Lab-6-CYSE450-Steganography.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Lab-6-CYSE450-Steganography.\"><\/object><a id=\"wp-block-file--media-fb4b8fd8-887b-427b-9de0-450ad7b7259b\" href=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Lab-6-CYSE450-Steganography.pdf\">annotated-Lab-6-CYSE450-Steganography<\/a><a href=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Lab-6-CYSE450-Steganography.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-fb4b8fd8-887b-427b-9de0-450ad7b7259b\">Download<\/a><\/div>\n\n\n\n<p>Lab 7 Assignment: Packet Sniffing<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Assignment20-20Arp20Spoofing.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Assignment20-20Arp20Spoofing.\"><\/object><a id=\"wp-block-file--media-575b446b-f8a3-4929-8a07-0d435dba9b8a\" href=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Assignment20-20Arp20Spoofing.pdf\">annotated-Assignment20-20Arp20Spoofing<\/a><a href=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Assignment20-20Arp20Spoofing.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-575b446b-f8a3-4929-8a07-0d435dba9b8a\">Download<\/a><\/div>\n\n\n\n<p>Lab 8 Assignment: Metasploit Framework<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Assignment-11-Metasploit20Framework.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Assignment-11-Metasploit20Framework.docx.\"><\/object><a id=\"wp-block-file--media-2f555672-0d6d-48b4-8848-344a0ed5f909\" href=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Assignment-11-Metasploit20Framework.docx.pdf\">annotated-Assignment-11-Metasploit20Framework.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Assignment-11-Metasploit20Framework.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-2f555672-0d6d-48b4-8848-344a0ed5f909\">Download<\/a><\/div>\n\n\n\n<p>Lab 9 Assignment: SQL Injection<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Lab-SQL-Injection.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Lab-SQL-Injection.\"><\/object><a id=\"wp-block-file--media-7c9d319f-9f74-4360-b2aa-725f4392d322\" href=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Lab-SQL-Injection.pdf\">annotated-Lab-SQL-Injection<\/a><a href=\"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-content\/uploads\/sites\/30621\/2024\/04\/annotated-Lab-SQL-Injection.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-7c9d319f-9f74-4360-b2aa-725f4392d322\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Lab 2 Assignment: Introduction to Ethical Hacking and Penetration Testing Lab 3 Assignment: Passive Reconnaissance Lab 4 Assignment: Active Reconnaissance and Foot Printing Lab 5 Assignment: Malware Attack and Cryptography Lab 6 Assignment: Steganography Lab 7 Assignment: Packet Sniffing Lab 8 Assignment: Metasploit Framework Lab 9 Assignment: SQL Injection<\/p>\n","protected":false},"author":24947,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-json\/wp\/v2\/pages\/372"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-json\/wp\/v2\/users\/24947"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-json\/wp\/v2\/comments?post=372"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-json\/wp\/v2\/pages\/372\/revisions"}],"predecessor-version":[{"id":382,"href":"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-json\/wp\/v2\/pages\/372\/revisions\/382"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/christian-carrion\/wp-json\/wp\/v2\/media?parent=372"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}