{"id":123,"date":"2023-02-02T21:33:42","date_gmt":"2023-02-02T21:33:42","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2025-04-22T05:13:53","modified_gmt":"2025-04-22T05:13:53","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/ismael200t\/cyse-301\/","title":{"rendered":"CYSE 301"},"content":{"rendered":"<h1 style=\"text-align: center\">Cybersecurity Techniques and Operations<\/h1>\n<p>This course introduces tools and techniques used to secure and analyze large computer networks and systems.\u00a0<\/p>\n<h2 style=\"text-align: center\">Hands On labs:\u00a0<\/h2>\n<h2>Assignment #2 &#8211; Traffic Tracing and Sniffing\u00a0\u00a0<\/h2>\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/04\/annotated-LAB202-20SAHMER.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-LAB202-20SAHMER.\"><\/object><a id=\"wp-block-file--media-7ae9fc0a-f77b-4634-b50f-d3e81e7afcfc\" href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/04\/annotated-LAB202-20SAHMER.pdf\">annotated-LAB202-20SAHMER<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/04\/annotated-LAB202-20SAHMER.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-7ae9fc0a-f77b-4634-b50f-d3e81e7afcfc\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Assignment #3 &#8211; Sword Vs. Shield <\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/04\/annotated-LAB320Sword20vs20Shield20-2020Sahmer20Ismael.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-LAB320Sword20vs20Shield20-2020Sahmer20Ismael.\"><\/object><a id=\"wp-block-file--media-b2d13116-1723-4572-8160-5fa95ed31d33\" href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/04\/annotated-LAB320Sword20vs20Shield20-2020Sahmer20Ismael.pdf\">annotated-LAB320Sword20vs20Shield20-2020Sahmer20Ismael<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/04\/annotated-LAB320Sword20vs20Shield20-2020Sahmer20Ismael.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-b2d13116-1723-4572-8160-5fa95ed31d33\">Download<\/a><\/div>\n\n\n\n<h2 class=\"wp-block-heading\"> Assignment #7 &#8211; Make your Own VPN Server<\/h2>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/04\/annotated-Assigment7-Sahmer.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Assigment7-Sahmer.\"><\/object><a id=\"wp-block-file--media-94f9d387-9efb-4948-a993-4abb773e93a0\" href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/04\/annotated-Assigment7-Sahmer.pdf\">annotated-Assigment7-Sahmer<\/a><a href=\"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-content\/uploads\/sites\/32449\/2025\/04\/annotated-Assigment7-Sahmer.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-94f9d387-9efb-4948-a993-4abb773e93a0\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Techniques and Operations This course introduces tools and techniques used to secure and analyze large computer networks and systems.\u00a0 Hands On labs:\u00a0 Assignment #2 &#8211; Traffic Tracing and Sniffing\u00a0\u00a0 Assignment #3 &#8211; Sword Vs. Shield Assignment #7 &#8211; Make your Own VPN Server<\/p>\n","protected":false},"author":26135,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/users\/26135"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":536,"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/pages\/123\/revisions\/536"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/ismael200t\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}