{"id":426,"date":"2025-05-05T12:25:15","date_gmt":"2025-05-05T12:25:15","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/janae\/?page_id=426"},"modified":"2025-05-05T13:14:27","modified_gmt":"2025-05-05T13:14:27","slug":"cyse-368-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/janae\/cyse-368-2\/","title":{"rendered":"CYSE 368"},"content":{"rendered":"\n<p><strong>Course Description:<\/strong><br>This course allows students to volunteer at an organization related to cybersecurity. Students must complete 50 hours per credit, along with assigned reflections, a final paper, and documentation of tasks completed during the internship.<\/p>\n\n\n\n<p>Course Materials:<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/janae\/wp-content\/uploads\/sites\/36565\/2025\/05\/Reflection-paper-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Reflection-paper-1.\"><\/object><a id=\"wp-block-file--media-5f42b892-0b84-4489-b75f-f1f90245013a\" href=\"https:\/\/sites.wp.odu.edu\/janae\/wp-content\/uploads\/sites\/36565\/2025\/05\/Reflection-paper-1.pdf\">Reflection-paper-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/janae\/wp-content\/uploads\/sites\/36565\/2025\/05\/Reflection-paper-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-5f42b892-0b84-4489-b75f-f1f90245013a\">Download<br><\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/janae\/wp-content\/uploads\/sites\/36565\/2025\/05\/Reflection-Paper-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Reflection-Paper-2.\"><\/object><a id=\"wp-block-file--media-8dc508af-e175-4f5a-b4a3-e849e7e5d7fa\" href=\"https:\/\/sites.wp.odu.edu\/janae\/wp-content\/uploads\/sites\/36565\/2025\/05\/Reflection-Paper-2.pdf\">Reflection-Paper-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/janae\/wp-content\/uploads\/sites\/36565\/2025\/05\/Reflection-Paper-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-8dc508af-e175-4f5a-b4a3-e849e7e5d7fa\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/janae\/wp-content\/uploads\/sites\/36565\/2025\/05\/Reflection-Paper-3.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Reflection-Paper-3.\"><\/object><a id=\"wp-block-file--media-f1db5ea1-80e4-45e9-80d9-f1b49fe458a5\" href=\"https:\/\/sites.wp.odu.edu\/janae\/wp-content\/uploads\/sites\/36565\/2025\/05\/Reflection-Paper-3.pdf\">Reflection-Paper-3<\/a><a href=\"https:\/\/sites.wp.odu.edu\/janae\/wp-content\/uploads\/sites\/36565\/2025\/05\/Reflection-Paper-3.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-f1db5ea1-80e4-45e9-80d9-f1b49fe458a5\">Download<\/a><\/div>\n\n\n\n<p><a href=\"https:\/\/docs.google.com\/document\/d\/18baDxLU-CGnejZUXCqXk_eFXod3OU5ae5W2mVmd9y18\/edit?usp=sharing\">Final Paper<\/a> <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Using Course Understanding<\/strong><br>My internship with Oeson Learning let me put what I had acquired in class to use in the workplace. Not only were ideas like network traffic analysis, vulnerability scanning, and risk assessments something I learned; I actually got to utilize Wireshark, Nessus, and pfSense to implement them. Seeing how everything relates in real-time made what I studied in past courses more logical. Rather of concentrating on case studies, I was producing reports like someone truly working in the field and solving real-life issues.&nbsp;<\/p>\n\n\n\n<p><strong>Learning Skills<\/strong><br>This internship gave me soft as well as technical development. I discovered how to look at odd network behavior, spot vulnerabilities, and divide security concerns into reports others could grasp. I improved in time management on my own, job organization, and clearly documentation of outcomes. Since I had to justify difficult concepts to non-technical readers, I also developed my technical writing. By the conclusion of the internship, Nmap, Nessus, and Wireshark were second nature. My final paper&#8217;s appendices include a few work examples illustrating this: phishing training draft, firewall analysis, and breach report draft.<\/p>\n\n\n\n<p><strong>Human Growth<\/strong><br>This experience clarified the type of cybersecurity job I prefer and where I see myself pursuing after graduation. Even in a distance, I developed my ability to work autonomously, rely on my judgment, and interact with a team. I also noticed how my manager spoke; expectations were always clear, which gave me confidence. I personally saw how much production vary depending on different leadership philosophies and open communication. I also become more conscious of the need of adaptation and staying focused even in cases where the solution is not clear.<\/p>\n\n\n\n<p>Now that I&#8217;m ready to work in this industry, I&#8217;m glad of how much I&#8217;ve developed in terms of professionalism as well as in terms of knowledge.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Course Description:This course allows students to volunteer at an organization related to cybersecurity. Students must complete 50 hours per credit, along with assigned reflections, a final paper, and documentation of tasks completed during the internship. Course Materials: Final Paper Using Course UnderstandingMy internship with Oeson Learning let me put what I had acquired in class&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/janae\/cyse-368-2\/\">Read More<\/a><\/div>\n","protected":false},"author":23006,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/janae\/wp-json\/wp\/v2\/pages\/426"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/janae\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/janae\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/janae\/wp-json\/wp\/v2\/users\/23006"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/janae\/wp-json\/wp\/v2\/comments?post=426"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/janae\/wp-json\/wp\/v2\/pages\/426\/revisions"}],"predecessor-version":[{"id":439,"href":"https:\/\/sites.wp.odu.edu\/janae\/wp-json\/wp\/v2\/pages\/426\/revisions\/439"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/janae\/wp-json\/wp\/v2\/media?parent=426"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}