{"id":306,"date":"2024-09-27T15:44:28","date_gmt":"2024-09-27T15:44:28","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jaredgibson\/?page_id=306"},"modified":"2024-11-21T01:21:15","modified_gmt":"2024-11-21T01:21:15","slug":"cyse-450","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jaredgibson\/cyse-450\/","title":{"rendered":"CYSE 450"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Ethical Hacking and Penetration<\/h2>\n\n\n\n<p>In my journey through CYSE 450, I delved into the foundational concepts of ethical hacking and gained hands-on experience with essential penetration testing tools on Kali Linux. This course equipped me with the skills to identify vulnerabilities across various systems and utilize industry-standard frameworks for effective penetration testing.<\/p>\n\n\n\n<p><strong>Key Learning Outcomes:<\/strong><\/p>\n\n\n\n<ul>\n<li>Acquired a solid understanding of ethical hacking principles and practices.<\/li>\n\n\n\n<li>Explored the legal frameworks that govern ethical hacking activities.<\/li>\n\n\n\n<li>Developed skills in scanning and enumeration techniques.<\/li>\n\n\n\n<li>Gained practical experience in system hacking methodologies.<\/li>\n\n\n\n<li>Conducted tests on web applications and data servers to identify security weaknesses.<\/li>\n\n\n\n<li>Learned to write scripts using Bash and Python for automation and analysis.<\/li>\n\n\n\n<li>Completed a comprehensive penetration test and prepared detailed reports on findings.<\/li>\n<\/ul>\n\n\n\n<p>This course not only enhanced my technical skills but also deepened my understanding of cybersecurity ethics and best practices.<\/p>\n\n\n\n<p><strong>Social Engineering Toolkit (SET)<\/strong><\/p>\n\n\n\n<p>As part of my practical learning in ethical hacking, I engaged with the Social Engineering Toolkit (SET), a powerful framework designed for simulating real-world social engineering attacks. Through this experience, I gained valuable insights into the tactics used by malicious actors and how to effectively counter them.<\/p>\n\n\n\n<p>Key Learning Outcomes:<\/p>\n\n\n\n<ul>\n<li>Developed proficiency in using SET\u2019s user-friendly command-line interface for various social engineering scenarios.<\/li>\n\n\n\n<li>Explored pre-built attack vectors, including phishing and credential harvesting, enhancing my understanding of potential vulnerabilities.<\/li>\n\n\n\n<li>Customized templates and payloads to tailor attacks for specific targets, reinforcing my skills in real-world application.<\/li>\n\n\n\n<li>Analyzed logs and reports generated by SET to evaluate the effectiveness of my techniques.<\/li>\n\n\n\n<li>Reinforced the importance of security awareness in defending against social engineering threats.<\/li>\n<\/ul>\n\n\n\n<p>This hands-on experience with SET not only sharpened my technical skills but also deepened my appreciation for cybersecurity ethics and the significance of protecting against social engineering attacks.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/jaredgibson\/wp-content\/uploads\/sites\/32536\/2024\/11\/annotated-Assignment-10.1.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Assignment-10.1.docx.\"><\/object><a id=\"wp-block-file--media-e98515bc-2119-403f-a488-bacea7cf8846\" href=\"https:\/\/sites.wp.odu.edu\/jaredgibson\/wp-content\/uploads\/sites\/32536\/2024\/11\/annotated-Assignment-10.1.docx.pdf\">annotated-Assignment-10.1.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/jaredgibson\/wp-content\/uploads\/sites\/32536\/2024\/11\/annotated-Assignment-10.1.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-e98515bc-2119-403f-a488-bacea7cf8846\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Ethical Hacking and Penetration In my journey through CYSE 450, I delved into the foundational concepts of ethical hacking and gained hands-on experience with essential penetration testing tools on Kali <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jaredgibson\/cyse-450\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":26177,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jaredgibson\/wp-json\/wp\/v2\/pages\/306"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jaredgibson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jaredgibson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaredgibson\/wp-json\/wp\/v2\/users\/26177"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaredgibson\/wp-json\/wp\/v2\/comments?post=306"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jaredgibson\/wp-json\/wp\/v2\/pages\/306\/revisions"}],"predecessor-version":[{"id":440,"href":"https:\/\/sites.wp.odu.edu\/jaredgibson\/wp-json\/wp\/v2\/pages\/306\/revisions\/440"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jaredgibson\/wp-json\/wp\/v2\/media?parent=306"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}