{"id":380,"date":"2023-11-06T01:00:35","date_gmt":"2023-11-06T01:00:35","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/?page_id=380"},"modified":"2025-05-05T18:04:33","modified_gmt":"2025-05-05T22:04:33","slug":"cyse-301-lab-reports","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/cyse-301-lab-reports\/","title":{"rendered":"Applied Linux Security Labs"},"content":{"rendered":"\n<p>This page highlights a series of Linux-based cybersecurity labs completed for <strong>CYSE 301: Cybersecurity Techniques and Operations<\/strong>. These hands-on projects involved practicing system hardening, incident response, ethical hacking, and securing operating systems against common cyber threats. Each lab focused on applying operational security concepts in real-world scenarios to strengthen technical skills and critical thinking.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Module 0<\/strong> &#8211; Basic Linux Commands<\/h3>\n\n\n\n<p>This lab focused on practicing essential Linux terminal commands used for file navigation, permissions, user management, and basic system control in cybersecurity environments.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2023\/11\/Lab-Report-for-Assignment-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Lab-Report-for-Assignment-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Module 1<\/strong> &#8211; Traffic Tracing and Sniffing<\/h3>\n\n\n\n<p>This lab involved using network analysis tools to trace, capture, and interpret network traffic, helping to identify potential security vulnerabilities and understand normal versus abnormal network behavior.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2023\/11\/Lab-Report-for-Assignment-2.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Lab-Report-for-Assignment-2<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Module 2 &#8211; Sword vs. Shield<\/h3>\n\n\n\n<p>This lab simulated offensive and defensive cybersecurity operations by testing vulnerabilities in a controlled environment and applying defense techniques to secure the system.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2023\/11\/Lab-Report-for-Assignment-3.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Lab-Report-for-Assignment-3<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Module 3 &#8211; Ethical Hacking<\/h3>\n\n\n\n<p>This lab explored ethical hacking principles and penetration testing strategies, using practical exercises to demonstrate how attackers exploit vulnerabilities and how defenders can identify and patch security gaps.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2023\/11\/Lab-Report-for-Assignment-4.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Lab-Report-for-Assignment-4<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Module 4 &#8211; Password Cracking<\/h3>\n\n\n\n<p>In this part of the lab, I explored how different systems store and protect passwords. I practiced using cybersecurity tools to crack passwords, gaining a deeper understanding of password vulnerabilities and the importance of strong authentication methods.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Module 5 &#8211; Wireless Security<\/h3>\n\n\n\n<p>In this part of the lab, I focused on the vulnerabilities of Wi-Fi networks. I used security tools to capture wireless traffic, decrypt network communications, and analyze weaknesses in common wireless encryption protocols.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-dots\" \/>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-content\/uploads\/sites\/33811\/2024\/04\/Lab-Report-for-Assignment-5.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Lab-Report-for-Assignment-5<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity is-style-wide\" \/>\n\n\n\n<h3 class=\"wp-block-heading\">Module 6 &#8211; Hide Your Secret!<\/h3>\n\n\n\n<p>In this lab, I practiced using steganography techniques to hide sensitive information within files and learned methods for detecting hidden data, highlighting the challenges of data protection and cyber forensics.<\/p>\n\n\n\n<p>(No report available to attach.)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This page highlights a series of Linux-based cybersecurity labs completed for CYSE 301: Cybersecurity Techniques and Operations. These hands-on projects involved practicing system hardening, incident response, ethical hacking, and securing operating systems against common cyber threats. Each lab focused on&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/cyse-301-lab-reports\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27258,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages\/380"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/users\/27258"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/comments?post=380"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages\/380\/revisions"}],"predecessor-version":[{"id":1311,"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/pages\/380\/revisions\/1311"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jasmyn-wilhelm\/wp-json\/wp\/v2\/media?parent=380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}