{"id":625,"date":"2024-11-27T01:14:20","date_gmt":"2024-11-27T01:14:20","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/?page_id=625"},"modified":"2024-11-27T01:14:20","modified_gmt":"2024-11-27T01:14:20","slug":"cyse-301-cybersecurity-techniques-and-operations","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/cyse-301-cybersecurity-techniques-and-operations\/","title":{"rendered":"CYSE 301 Cybersecurity Techniques and Operations"},"content":{"rendered":"\n<p>Here is a collection of detailed step by step assignments for ODU&#8217;s Cybersecurity Techniques and Operations class. This class gave detailed instruction and lab practice for basic techniques, tactics, and security practices to include network traffic analysis, establishing firewall rules, and ethical hacking.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-edwin-wells-e-portfolio wp-block-embed-edwin-wells-e-portfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"9KF3G85Htu\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/traffic-tracing-and-sniffing\/\">Traffic Tracing and Sniffing<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Traffic Tracing and Sniffing&#8221; &#8212; Edwin Wells E-Portfolio\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/traffic-tracing-and-sniffing\/embed\/#?secret=rYlVUkFhYR#?secret=9KF3G85Htu\" data-secret=\"9KF3G85Htu\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-edwin-wells-e-portfolio wp-block-embed-edwin-wells-e-portfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"Gugob2Pj4V\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/sword-vs-shield\/\">Sword vs. Shield<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Sword vs. Shield&#8221; &#8212; Edwin Wells E-Portfolio\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/sword-vs-shield\/embed\/#?secret=h5AH0rl0So#?secret=Gugob2Pj4V\" data-secret=\"Gugob2Pj4V\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n\n\n\n<figure class=\"wp-block-embed is-type-wp-embed is-provider-edwin-wells-e-portfolio wp-block-embed-edwin-wells-e-portfolio\"><div class=\"wp-block-embed__wrapper\">\n<blockquote class=\"wp-embedded-content\" data-secret=\"emZ2i5d6GW\"><a href=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/ethical-hacking\/\">Ethical Hacking<\/a><\/blockquote><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;Ethical Hacking&#8221; &#8212; Edwin Wells E-Portfolio\" src=\"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/ethical-hacking\/embed\/#?secret=LLzPhqfwKs#?secret=emZ2i5d6GW\" data-secret=\"emZ2i5d6GW\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe>\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Here is a collection of detailed step by step assignments for ODU&#8217;s Cybersecurity Techniques and Operations class. This class gave detailed instruction and lab practice for basic techniques, tactics, and security practices to include network traffic analysis, establishing firewall rules, and ethical hacking.<\/p>\n","protected":false},"author":25223,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/pages\/625"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/users\/25223"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/comments?post=625"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/pages\/625\/revisions"}],"predecessor-version":[{"id":629,"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/pages\/625\/revisions\/629"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/edwin-wells-4\/wp-json\/wp\/v2\/media?parent=625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}