{"id":285,"date":"2024-12-04T23:03:24","date_gmt":"2024-12-05T04:03:24","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyse201fall23\/?page_id=285"},"modified":"2024-12-04T23:48:44","modified_gmt":"2024-12-05T04:48:44","slug":"artifacts-for-skill-3","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/cyse201fall23\/artifacts-for-skill-3\/","title":{"rendered":"Artifacts for Skill 3"},"content":{"rendered":"\n<p><strong>Artifact 1: Wireshark Packet Capture and Analysis<\/strong><\/p>\n\n\n\n<ul>\n<li><em>Artifact Description:<\/em> A lab exercise capturing and analyzing network traffic using Wireshark. Tasks involved applying ICMP and DNS filters and interpreting packet-level data.<\/li>\n\n\n\n<li><em>Skills Demonstrated:<\/em>\n<ul>\n<li>Mastery of packet analysis for identifying network anomalies.<\/li>\n\n\n\n<li>Application of filtering techniques for efficient data interpretation.<\/li>\n\n\n\n<li>Understanding network communication protocols.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><em>Relevance to Career Goals:<\/em> Demonstrates hands-on experience with a critical tool for network monitoring and forensic analysis.<\/li>\n<\/ul>\n\n\n\n<p><strong>Artifact 2: Network Scanning with Nmap\/Zenmap<\/strong><\/p>\n\n\n\n<ul>\n<li><em>Artifact Description:<\/em> A report on network scanning activities performed using Nmap and its GUI counterpart Zenmap to identify vulnerabilities and open ports.<\/li>\n\n\n\n<li><em>Skills Demonstrated:<\/em>\n<ul>\n<li>Conducting vulnerability assessments using advanced scanning techniques.<\/li>\n\n\n\n<li>Mapping network structures to detect potential threats.<\/li>\n\n\n\n<li>Translating technical findings into actionable recommendations.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><em>Relevance to Career Goals:<\/em> Highlights my ability to perform penetration testing and risk assessments.<\/li>\n<\/ul>\n\n\n\n<p><strong>Artifact 3: Firewall Configuration in pfSense<\/strong><\/p>\n\n\n\n<ul>\n<li><em>Artifact Description:<\/em> A configuration guide demonstrating the setup of firewall rules in pfSense to secure virtual machine communication.<\/li>\n\n\n\n<li><em>Skills Demonstrated:<\/em>\n<ul>\n<li>Implementing and testing firewall rules to enforce security policies.<\/li>\n\n\n\n<li>Configuring interfaces, NAT, and other pfSense features.<\/li>\n\n\n\n<li>Troubleshooting configuration issues to ensure operational effectiveness.<\/li>\n<\/ul>\n<\/li>\n\n\n\n<li><em>Relevance to Career Goals:<\/em> Showcases expertise in network security and policy enforcement, crucial for system administrator or network engineer roles.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Artifact 1: Wireshark Packet Capture and Analysis Artifact 2: Network Scanning with Nmap\/Zenmap Artifact 3: Firewall Configuration in pfSense<\/p>\n","protected":false},"author":22332,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201fall23\/wp-json\/wp\/v2\/pages\/285"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201fall23\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201fall23\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201fall23\/wp-json\/wp\/v2\/users\/22332"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/cyse201fall23\/wp-json\/wp\/v2\/comments?post=285"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/cyse201fall23\/wp-json\/wp\/v2\/pages\/285\/revisions"}],"predecessor-version":[{"id":296,"href":"https:\/\/sites.wp.odu.edu\/cyse201fall23\/wp-json\/wp\/v2\/pages\/285\/revisions\/296"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/cyse201fall23\/wp-json\/wp\/v2\/media?parent=285"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}