{"id":123,"date":"2024-02-12T20:40:44","date_gmt":"2024-02-12T20:40:44","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2026-03-03T23:22:21","modified_gmt":"2026-03-03T23:22:21","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jaquanodom\/cyse-301\/","title":{"rendered":"CYSE 301"},"content":{"rendered":"<h1 data-start=\"309\" data-end=\"361\">Cybersecurity Techniques and Operations (CYSE 301)<\/h1>\n<h2 data-start=\"363\" data-end=\"381\">Course Overview<\/h2>\n<p data-start=\"382\" data-end=\"817\">CYSE 301 focused on the practical tools and techniques used in cybersecurity operations. The course introduced network traffic analysis, vulnerability scanning, penetration testing, password cracking, wireless security, and digital steganography. Students also learned the fundamentals of the C programming language, which is commonly used in cybersecurity for malware analysis, system programming, and understanding network protocols.<\/p>\n<p data-start=\"819\" data-end=\"1070\">Through programming assignments and hands-on cybersecurity labs, I gained experience analyzing network traffic, identifying vulnerabilities, performing penetration testing, and using cybersecurity tools commonly used in real-world security operations.<\/p>\n<h2 data-start=\"1072\" data-end=\"1092\">Learning Outcomes<\/h2>\n<h3 data-start=\"1094\" data-end=\"1123\">C Programming Foundations<\/h3>\n<p data-start=\"1124\" data-end=\"1359\">The first part of the course focused on learning the C programming language. This programming knowledge helps cybersecurity professionals understand how software works at a lower level and how vulnerabilities can exist inside programs.<\/p>\n<p data-start=\"1361\" data-end=\"1555\">During the programming portion of the course I practiced writing and analyzing C programs that perform different tasks such as string manipulation, pointer operations, and command-line programs.<\/p>\n<p data-start=\"1557\" data-end=\"1601\">Examples of programming assignments include:<\/p>\n<ul data-start=\"1603\" data-end=\"2051\">\n<li data-start=\"1603\" data-end=\"1687\">\n<p data-start=\"1605\" data-end=\"1687\">Writing a function <strong data-start=\"1624\" data-end=\"1635\">htoi(s)<\/strong> to convert hexadecimal strings into integer values.<\/p>\n<\/li>\n<li data-start=\"1688\" data-end=\"1792\">\n<p data-start=\"1690\" data-end=\"1792\">Writing a function <strong data-start=\"1709\" data-end=\"1724\">any(s1, s2)<\/strong> that identifies where characters from one string appear in another.<\/p>\n<\/li>\n<li data-start=\"1793\" data-end=\"1868\">\n<p data-start=\"1795\" data-end=\"1868\">Using <strong data-start=\"1801\" data-end=\"1836\">pointers to concatenate strings<\/strong> using a custom strcat function.<\/p>\n<\/li>\n<li data-start=\"1869\" data-end=\"1957\">\n<p data-start=\"1871\" data-end=\"1957\">Writing a program that evaluates <strong data-start=\"1904\" data-end=\"1956\">reverse polish expressions from the command line<\/strong>.<\/p>\n<\/li>\n<li data-start=\"1958\" data-end=\"2051\">\n<p data-start=\"1960\" data-end=\"2051\">Writing a program that compares <strong data-start=\"1992\" data-end=\"2050\">two files and detects the first line where they differ<\/strong>.<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"2053\" data-end=\"2179\">These exercises helped strengthen my programming logic and improved my ability to understand how software operates internally.<\/p>\n<h2 data-start=\"2181\" data-end=\"2219\">Cybersecurity Laboratory Experience<\/h2>\n<p data-start=\"2221\" data-end=\"2348\">The second half of the course focused on hands-on cybersecurity operations using tools commonly used by security professionals.<\/p>\n<h3 data-start=\"2350\" data-end=\"2390\">Traffic Tracing and Network Analysis<\/h3>\n<p data-start=\"2391\" data-end=\"2587\">In this lab I used <strong data-start=\"2410\" data-end=\"2435\">Wireshark and TCPdump<\/strong> to capture and analyze network traffic. I learned how to inspect packets, understand protocol behavior, and trace suspicious activity across a network.<\/p>\n<p data-start=\"2589\" data-end=\"2702\">This lab helped develop the ability to investigate network communications and identify abnormal traffic patterns.<\/p>\n<h3 data-start=\"2704\" data-end=\"2743\">Firewall Configuration with pfSense<\/h3>\n<p data-start=\"2744\" data-end=\"2926\">This lab involved configuring a <strong data-start=\"2776\" data-end=\"2796\">pfSense firewall<\/strong> to protect a network environment. I practiced setting firewall rules and analyzing how traffic flows through a protected network.<\/p>\n<p data-start=\"2928\" data-end=\"3033\">This experience demonstrated how firewalls help prevent unauthorized access and protect internal systems.<\/p>\n<h3 data-start=\"3035\" data-end=\"3069\">Network Vulnerability Scanning<\/h3>\n<p data-start=\"3070\" data-end=\"3294\">In this lab I used <strong data-start=\"3089\" data-end=\"3097\">Nmap<\/strong> to scan networks and identify potential vulnerabilities. Network scanning allows security professionals to detect open ports, running services, and potential weaknesses that attackers may exploit.<\/p>\n<h3 data-start=\"3296\" data-end=\"3319\">Penetration Testing<\/h3>\n<p data-start=\"3320\" data-end=\"3545\">This lab introduced <strong data-start=\"3340\" data-end=\"3405\">penetration testing techniques using the Metasploit framework<\/strong>. I practiced identifying vulnerabilities in Windows systems and executing controlled attacks to demonstrate how systems can be compromised.<\/p>\n<p data-start=\"3547\" data-end=\"3666\">This exercise helped demonstrate how attackers exploit weaknesses and why proper security configurations are important.<\/p>\n<h3 data-start=\"3668\" data-end=\"3689\">Password Cracking<\/h3>\n<p data-start=\"3690\" data-end=\"3971\">This lab explored how passwords are stored in operating systems and how attackers attempt to break weak passwords. Using password cracking tools in Linux and Windows environments, I learned why strong password policies and hashing methods are critical for protecting user accounts.<\/p>\n<h3 data-start=\"3973\" data-end=\"4002\">Wireless Network Security<\/h3>\n<p data-start=\"4003\" data-end=\"4169\">This lab examined vulnerabilities in <strong data-start=\"4040\" data-end=\"4058\">Wi-Fi networks<\/strong> and demonstrated how attackers can intercept or crack wireless communications when security settings are weak.<\/p>\n<p data-start=\"4171\" data-end=\"4245\">The lab emphasized the importance of secure wireless encryption protocols.<\/p>\n<h3 data-start=\"4247\" data-end=\"4272\">Digital Steganography<\/h3>\n<p data-start=\"4273\" data-end=\"4480\">In this exercise I explored <strong data-start=\"4301\" data-end=\"4326\">digital steganography<\/strong>, which is the process of hiding information within files such as images. Using tools such as <strong data-start=\"4420\" data-end=\"4432\">steghide<\/strong>, I practiced hiding and extracting hidden data.<\/p>\n<p data-start=\"4482\" data-end=\"4588\">This lab demonstrated how attackers and security professionals may conceal or discover hidden information.<\/p>\n<h2 data-start=\"4590\" data-end=\"4616\">Course Skills and Tools<\/h2>\n<p data-start=\"4617\" data-end=\"4726\">Throughout CYSE 301 I gained hands-on experience with several cybersecurity tools and technologies including:<\/p>\n<ul data-start=\"4728\" data-end=\"4893\">\n<li data-start=\"4728\" data-end=\"4741\">\n<p data-start=\"4730\" data-end=\"4741\">Wireshark<\/p>\n<\/li>\n<li data-start=\"4742\" data-end=\"4753\">\n<p data-start=\"4744\" data-end=\"4753\">TCPdump<\/p>\n<\/li>\n<li data-start=\"4754\" data-end=\"4762\">\n<p data-start=\"4756\" data-end=\"4762\">Nmap<\/p>\n<\/li>\n<li data-start=\"4763\" data-end=\"4787\">\n<p data-start=\"4765\" data-end=\"4787\">Metasploit Framework<\/p>\n<\/li>\n<li data-start=\"4788\" data-end=\"4808\">\n<p data-start=\"4790\" data-end=\"4808\">pfSense Firewall<\/p>\n<\/li>\n<li data-start=\"4809\" data-end=\"4833\">\n<p data-start=\"4811\" data-end=\"4833\">Linux security tools<\/p>\n<\/li>\n<li data-start=\"4834\" data-end=\"4861\">\n<p data-start=\"4836\" data-end=\"4861\">Password cracking tools<\/p>\n<\/li>\n<li data-start=\"4862\" data-end=\"4893\">\n<p data-start=\"4864\" data-end=\"4893\">Digital steganography tools<\/p>\n<\/li>\n<\/ul>\n<p data-start=\"4895\" data-end=\"5003\">These tools are widely used in cybersecurity operations, network security analysis, and penetration testing.<\/p>\n<h2 data-start=\"5005\" data-end=\"5038\">Application to My Career Goals<\/h2>\n<p data-start=\"5039\" data-end=\"5263\">CYSE 301 provided practical experience using real cybersecurity tools and techniques. The course strengthened my ability to analyze network traffic, identify vulnerabilities, and understand how attacks occur in real systems.<\/p>\n<p data-start=\"5265\" data-end=\"5476\">The skills developed in this course support my goal of working in cybersecurity and network security roles where monitoring networks, investigating threats, and protecting systems are essential responsibilities.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Techniques and Operations (CYSE 301) Course Overview CYSE 301 focused on the practical tools and techniques used in cybersecurity operations. The course introduced network traffic analysis, vulnerability scanning, penetration testing, password cracking, wireless security, and digital steganography. Students also learned the fundamentals of the C programming language, which is commonly used in cybersecurity for&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jaquanodom\/cyse-301\/\">Read More<\/a><\/div>\n","protected":false},"author":28664,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jaquanodom\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jaquanodom\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jaquanodom\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaquanodom\/wp-json\/wp\/v2\/users\/28664"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaquanodom\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jaquanodom\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":370,"href":"https:\/\/sites.wp.odu.edu\/jaquanodom\/wp-json\/wp\/v2\/pages\/123\/revisions\/370"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jaquanodom\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}