Cyber Programming

Final Project Social Media Socket Program:

434D547C-C359-4759-A4F0-C4E01FCC60BF

Skill Demonstrated: Coding through Python, research, and software engineering

Problem: During my CYSE 250 class, our final project was to create a socket program on any topic using the skills we learned over the semester. I chose to create mine on the history of each trending social media platform in 2024.

Action: Before creating the program, I had to research the facts regarding, controversies, creators, purpose, etc. for several media platforms, including; Instagram and Snapchat. Next, using the correct formatting with the host, port, and address, I created a client server connection. Finally, for the body of the code, I inserted all the information using “While true” commands and if-else loops to properly show the client server response while using the program.

Result: This artifact demonstrates my ability to use and effectively create a program using Python. It also shows how my research turned into a usable product, that is a quick way to understand social media and why it is used daily. These are basic social engineering skills that can be built on to create websites and apps.

CYSE 301: Sword vs. Shield Assignment:

E0992FE8-79F0-4F7A-8F7C-2D6264AA13DF

Skill Demonstrated: Network Scanning, Configuring a firewall

Problem: For this assignment, I had to act as an attacker at first, by analyzing the network traffic. Then, I had to provide the correct countermeasures by configuring different firewalls.

Action: I had to work between 4 different virtual machines, External Kali, pfsense, Ubuntu, and Windows Server 2022. I had to use various command to analyze the traffic on Ubutuntu. Then I used Wireshark while having other VMs running to establish monitor that traffic, Finally, I configured 3 different firewalls.

Result: To conclude, I believe this assignment was to get us comfortable with configuring firewalls, and monitoring network traffic. These is especially necessary professionally when working as a cybersecurity professional, because in order to successfully, deter cybercrime is when the analyst is consistently checking about for pests and other animals. During this activity, I strengthened my Wireshark skills, but I leaned how to check it strictly through the Linux OS. Lastly, this lesson taught me how to work with/set up a firewall.

CYSE 270: Group and User Management

59F6D30D-9516-4526-889E-220326FE87FC

Skill Demonstrated: Group and User management in a Linux OS

Problem: I must create and assign new users to groups only by using Linux commands. I must also navigate to different directories, and create files and assign them to groups. Lastly, I had to delete a group to see what happens with the file, while remaining to one use Linux commands.

Action: I first showed the original user information, then began creating the user accounts & setting their passwords by using commands like grep, useradd, and passwd. Next, I changed the shell to a bash shell. I verified my work then I began creating the user groups, some with a GID, and switch to its home dierectory. I used the su, cd, and usermod commands to complete that step. Finally, I created a file using the touch command and assigned it to a group before deleting the group.

Result: Once I deleted the group I found that the user changed to the GID. I also become a stronger coder, because I was having hands-on practice working in a Linux environment. I became confident in my ability to create new users and group accounts, which could come in handy when working an IT help desk job.