{"id":324,"date":"2025-11-17T04:01:03","date_gmt":"2025-11-17T04:01:03","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/isaac-huston\/?page_id=324"},"modified":"2025-11-17T17:26:44","modified_gmt":"2025-11-17T17:26:44","slug":"network-security-analysis","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/isaac-huston\/skills\/network-security-analysis\/","title":{"rendered":"Network Security Analysis"},"content":{"rendered":"\n<h3 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-e9672499b6750117425642a0af10e751\"><a href=\"https:\/\/sites.wp.odu.edu\/isaac-huston\/skills\/network-security-analysis\/tryhackme-blue-walk-through\/\" data-type=\"page\" data-id=\"359\">TryHackMe Blue Walk-through<\/a><\/h3>\n\n\n\n<p>Full Windows box analysis chaining enumeration, exploitation, and proof of concept. Demonstrates end to end analytical workflow and technical reporting.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-1441aee1b541408f444aed01ae362bb4\"><a href=\"https:\/\/sites.wp.odu.edu\/isaac-huston\/skills\/network-security-analysis\/hack-the-box-crocodile-walk-through\/\" data-type=\"page\" data-id=\"363\">Hack The Box Crocodile Walk-through<\/a><\/h3>\n\n\n\n<p id=\"block-1d30ed57-4566-45c3-8a1a-c024ff3fa358\">End-to-end engagement showing service behavior, attack-path logic, and containment strategy. Reflects practical penetration testing methodology.<\/p>\n\n\n\n<h3 class=\"wp-block-heading has-vivid-cyan-blue-color has-text-color has-link-color wp-elements-9a5df56e9ed88c32e4150d61a7cf78fb\"><a href=\"https:\/\/sites.wp.odu.edu\/isaac-huston\/skills\/network-security-analysis\/nmap-scanning-procedures\/\" data-type=\"page\" data-id=\"366\">NMAP Scanning Procedures<\/a><\/h3>\n\n\n\n<p id=\"block-4fbd096b-ea00-4a24-a078-dc8ada1a1f92\">Detailed record of scan commands, flag selection, and service enumeration steps. Shows how I translate network data into actionable insight.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>TryHackMe Blue Walk-through Full Windows box analysis chaining enumeration, exploitation, and proof of concept. Demonstrates end to end analytical workflow and technical reporting. Hack The Box Crocodile Walk-through End-to-end engagement showing service behavior, attack-path logic, and containment strategy. Reflects practical penetration testing methodology. NMAP Scanning Procedures Detailed record of scan commands, flag selection, and service&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/isaac-huston\/skills\/network-security-analysis\/\">Read More<\/a><\/div>\n","protected":false},"author":30346,"featured_media":0,"parent":318,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/pages\/324"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/users\/30346"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/comments?post=324"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/pages\/324\/revisions"}],"predecessor-version":[{"id":368,"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/pages\/324\/revisions\/368"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/pages\/318"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/isaac-huston\/wp-json\/wp\/v2\/media?parent=324"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}