{"id":123,"date":"2023-07-29T08:58:18","date_gmt":"2023-07-29T08:58:18","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2024-06-18T00:02:09","modified_gmt":"2024-06-18T00:02:09","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/hbramow\/cyse-301\/","title":{"rendered":"CYSE 301 &#8211; Cyber Techniques and Operations"},"content":{"rendered":"<h1 style=\"text-align: center\">Cybersecurity Techniques and Operations<\/h1>\n<p>This course introduces tools and techniques used to secure and analyze large computer networks and systems. Students work with a foundation for many cybersecurity operations, such as malware analysis, understanding network protocol stack.\u00a0 It also explores and maps networks using a variety of diagnostic software tools.\u00a0 It also includes:\u00a0 advanced packet analysis, configure firewalls, intrusion detection rules, performing forensic investigation, and practicing the techniques for pen testing using Kali Linux. The objectives are:<\/p>\n<ul>\n<li>Understand the concepts and major constructs of the programming language and master those skills.<\/li>\n<li>The ability to analyze source code that infers functionality of a given code segment.<\/li>\n<li>Students grasp necessary techniques and skills to write cybersecurity operations such as a network protocol stack.<\/li>\n<li>Skills to monitor\/analyze the network traffic such as using WireShark and identification\/tracing of that traffic when intrusions are identified.<\/li>\n<li>Identify\/evaluate network vulnerabilities, then implement effective countermeasures as protection.<\/li>\n<li>Master technologies used in exploits on the vulnerabilities in remote systems.<\/li>\n<li>Vulnerability analysis in wireless (Wi-Fi) communication networks,<\/li>\n<li>Practice secure data management skills and secure personal information.<\/li>\n<\/ul>\n<h1>Course Materials<\/h1>\n<p>There are both programming assignments and hands-on labs using Palo Alto Networks for cybersecurity operations.\u00a0The hands-on labs are as follows:<\/p>\n<ol>\n<li>Traffic tracing through Wireshark and TCPdump<\/li>\n<li>Firewall configuration with pfSense<\/li>\n<li>Penetration test on Windows &#8211; remote access vulnerability &#8211; Kali Linux<\/li>\n<li>Password cracking &#8211; Jack the Ripper<\/li>\n<li>WiFi password cracking<\/li>\n<li>Information hiding &#8211; Digital Steganog<\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Techniques and Operations This course introduces tools and techniques used to secure and analyze large computer networks and systems. Students work with a foundation for many cybersecurity operations, such as malware analysis, understanding network protocol stack.\u00a0 It also explores and maps networks using a variety of diagnostic software tools.\u00a0 It also includes:\u00a0 advanced packet&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/hbramow\/cyse-301\/\">Read More<\/a><\/div>\n","protected":false},"author":27054,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/users\/27054"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":793,"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/pages\/123\/revisions\/793"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/hbramow\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}