{"id":138,"date":"2023-09-03T23:00:20","date_gmt":"2023-09-03T23:00:20","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=138"},"modified":"2025-04-29T04:02:14","modified_gmt":"2025-04-29T04:02:14","slug":"cyse-368","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse-damcc\/cyse-368\/","title":{"rendered":"Cyber Techniques and Operations"},"content":{"rendered":"\n<p>In this class I learned and practiced using fundamental cyber security techniques and tools used for analyzing network traffic, practice with Linux and Windows commands and tools, and hacking tools. The skills I practice include traffic tracing and analysis, configuring firewalls, penetration testing with metasploit, password cracking, and digital stenography.<\/p>\n\n\n\n<p>In this document below I provide an assignment where I encrypt a text document using digital stenography<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/cyse-damcc\/wp-content\/uploads\/sites\/34009\/2025\/04\/Assignment-6.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Digital Stenography.\"><\/object><a id=\"wp-block-file--media-d0e2a8a9-184e-4961-b7a9-c49126dc3037\" href=\"https:\/\/sites.wp.odu.edu\/cyse-damcc\/wp-content\/uploads\/sites\/34009\/2025\/04\/Assignment-6.pdf\">Digital Stenography<\/a><a href=\"https:\/\/sites.wp.odu.edu\/cyse-damcc\/wp-content\/uploads\/sites\/34009\/2025\/04\/Assignment-6.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-d0e2a8a9-184e-4961-b7a9-c49126dc3037\">Download<\/a><\/div>\n\n\n\n<p>In the link below I have provided a sword and shield assignment that shows me finding vulnerabilities in the LAN network as an attacker and applying proper countermeasures<\/p>\n\n\n\n<p><a href=\"https:\/\/docs.google.com\/document\/d\/1QgPcqZDoKCo4zPhlW9vtsrLgbS7t5Pkvdh9k0V4jg98\/edit?usp=sharinghttps:\/\/docs.google.com\/document\/d\/1QgPcqZDoKCo4zPhlW9vtsrLgbS7t5Pkvdh9k0V4jg98\/edit?usp=sharing\" data-type=\"link\" data-id=\"https:\/\/docs.google.com\/document\/d\/1QgPcqZDoKCo4zPhlW9vtsrLgbS7t5Pkvdh9k0V4jg98\/edit?usp=sharinghttps:\/\/docs.google.com\/document\/d\/1QgPcqZDoKCo4zPhlW9vtsrLgbS7t5Pkvdh9k0V4jg98\/edit?usp=sharing\">Sword and Shield<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this class I learned and practiced using fundamental cyber security techniques and tools used for analyzing network traffic, practice with Linux and Windows commands and tools, and hacking tools. <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/cyse-damcc\/cyse-368\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27380,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-damcc\/wp-json\/wp\/v2\/pages\/138"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-damcc\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-damcc\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-damcc\/wp-json\/wp\/v2\/users\/27380"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-damcc\/wp-json\/wp\/v2\/comments?post=138"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/cyse-damcc\/wp-json\/wp\/v2\/pages\/138\/revisions"}],"predecessor-version":[{"id":416,"href":"https:\/\/sites.wp.odu.edu\/cyse-damcc\/wp-json\/wp\/v2\/pages\/138\/revisions\/416"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-damcc\/wp-json\/wp\/v2\/media?parent=138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}