{"id":123,"date":"2022-09-19T16:11:21","date_gmt":"2022-09-19T16:11:21","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2025-04-23T23:04:08","modified_gmt":"2025-04-23T23:04:08","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jmedi\/cyse-301\/","title":{"rendered":"CYSE 301"},"content":{"rendered":"<h1 style=\"text-align: center\">Cybersecurity Techniques and Operations<\/h1>\n<p>Throughout this course, I learned and focused on tools and techniques used in the real world cyber operations. This course taught me a wide aray of hands on concepts that trains students on skills they will need to obtain\/ use to become cyber security professionals. Students used different computing environments or VMs to better understand the technology used.<\/p>\n<ul>\n<li>Gain an understanding of the concepts and any major constructs of the programming language C ,<\/li>\n<li>Proficient the programming skills of the programming language C,<\/li>\n<li>Able to analyze the C command source code to infer and underand the functionality of a given C Function, C segnment, C program etc,<\/li>\n<li>utilized necessary techniques and skills to write a C program in various cybersecurity operations such as a network protocol stack,<\/li>\n<li>Monitor and analyze network traffic. Able to not only Identify but trace the traffic when intrusion is detected on a network,<\/li>\n<li>Analyze the vulnerabilities in a wireless communication network,<\/li>\n<li>Manage data and personal information in a secure manner.<\/li>\n<\/ul>\n<p>The hands-on labs are as follows:<\/p>\n<ol>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/19uzEdpkVT4g8XA--9C40lHImOg36xU27SJhHUi15bcA\/edit?tab=t.0\">Traffic tracing through Wireshark and TCPdump<\/a><\/li>\n<li><a href=\"https:\/\/docs.google.com\/document\/d\/19BgiedTwNBn-eSXSEqpHN322huwD5dP944sOvhfqyL4\/edit?tab=t.0\">Firewall configuration with pfSense<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Techniques and Operations Throughout this course, I learned and focused on tools and techniques used in the real world cyber operations. This course taught me a wide aray of hands on concepts that trains students on skills they will need to obtain\/ use to become cyber security professionals. Students used different computing environments or&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jmedi\/cyse-301\/\">Read More<\/a><\/div>\n","protected":false},"author":24888,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jmedi\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jmedi\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jmedi\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jmedi\/wp-json\/wp\/v2\/users\/24888"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jmedi\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/jmedi\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":322,"href":"https:\/\/sites.wp.odu.edu\/jmedi\/wp-json\/wp\/v2\/pages\/123\/revisions\/322"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jmedi\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}