{"id":123,"date":"2025-01-15T16:23:44","date_gmt":"2025-01-15T16:23:44","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2026-02-10T16:55:11","modified_gmt":"2026-02-10T16:55:11","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse-didi\/cyse-301\/","title":{"rendered":"CYSE 301"},"content":{"rendered":"<h1 style=\"text-align: center\">Cybersecurity Techniques and Operations<\/h1>\n<p>This course introduces tools and techniques used to secure and analyze large computer networks and systems. Students will systematically learn C programming in the first part of the course, which forms a foundation for many cybersecurity operations, such as malware analysis, understanding network protocol stack, etc. In the second part, students will explore and map networks using a variety of diagnostic software tools, learn advanced packet analysis, configure firewalls, write intrusion detection rules, perform forensic investigation, and practice techniques for penetration testing. The objectives are:<\/p>\n<p>\u2022 Understand the rules and laws involved in real-world cyber operations,<br \/>\n\u2022 Understand the basic components of the model computing networks, and take different<br \/>\ntechniques to identify and trace the network traffic if an instruction is detected inside a<br \/>\nnetwork,<br \/>\n\u2022 Identify and evaluate the vulnerabilities in the network and implement effective<br \/>\ncountermeasures to protect the network from possible attacks,<br \/>\n\u2022 Understand how to plan, organize and perform penetration testing on a network,<br \/>\n\u2022 Understand different cryptographic protocols, tools, and mechanisms used for different<br \/>\nsystems, and exploit their weaknesses accordingly,<br \/>\n\u2022 Manage data and personal information in a secure manner<\/p>\n<h1>Course Material<\/h1>\n<p class=\"p1\">\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Techniques and Operations This course introduces tools and techniques used to secure and analyze large computer networks and systems. Students will systematically learn C programming in the first part of the course, which forms a foundation for many cybersecurity operations, such as malware analysis, understanding network protocol stack, etc. In the second part, students&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/cyse-didi\/cyse-301\/\">Read More<\/a><\/div>\n","protected":false},"author":30318,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-didi\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-didi\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-didi\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-didi\/wp-json\/wp\/v2\/users\/30318"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse-didi\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/cyse-didi\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":419,"href":"https:\/\/sites.wp.odu.edu\/cyse-didi\/wp-json\/wp\/v2\/pages\/123\/revisions\/419"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse-didi\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}