{"id":732,"date":"2025-04-26T16:03:36","date_gmt":"2025-04-26T16:03:36","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/joshuarussell\/?page_id=732"},"modified":"2025-04-29T02:50:56","modified_gmt":"2025-04-29T02:50:56","slug":"cyse-301-cybersecurity-techniques-and-operations","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/joshuarussell\/cyse-301-cybersecurity-techniques-and-operations\/","title":{"rendered":"CYSE 301: Cybersecurity Techniques and Operations"},"content":{"rendered":"<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"576\" src=\"http:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/Cyber-Security--1024x576.jpg\" alt=\"\" class=\"wp-image-762\" style=\"width:460px;height:auto\" srcset=\"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/Cyber-Security--1024x576.jpg 1024w, https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/Cyber-Security--300x169.jpg 300w, https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/Cyber-Security--768x432.jpg 768w, https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/Cyber-Security--1536x864.jpg 1536w, https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/Cyber-Security--2048x1152.jpg 2048w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/div>\n\n\n<p>This course focuses on tools and techniques involved in real-world cyber operations. It provides a<br>broad range of cybersecurity concepts and essential hands-on training for students who want to<br>become cybersecurity professionals. Students will learn the basic cybersecurity discipline, underline the model computing environment, and practice different tools and strategies to perform cyber attacks and defense operations.<\/p>\n\n\n\n<p>CYSE 301 taught me how to navigate the command line in a higher level through using Linux and several applications such as Ubuntu, Kali, and various Windows systems.  We were tasked with assignments like analyzing packets in Wireshark, ethical hacking, creating VPNs, password cracking, tracing traffic, and digital stenography to name a few.  These complex tasks demonstrate how to apply cyber techniques and operational duties through real-world scenarios.  Below is an example of an assignment I had to perform where I to create a VPN server.  In this assignment I was tasked with creating my own virtual private network (VPN) server through the Google Cloud platform.  I had to generate a user, configure the server, and create firewall rules.  <\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-content\/uploads\/sites\/37004\/2025\/04\/CYSE-301-Assignment-7-Make-Your-Own-VPN-Server.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-301-Assignment-7-Make-Your-Own-VPN-Server<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>This class was very technical and required me to practice using the command line and additional applications to complete the assignments.  My technical skills were put to the test and I enjoyed the challenges this class provided.  I am very comfortable performing complex commands, navigating systems through the command line, and using applications to perform analysis.  This course aligned with my value of responsibility because in order to succeed in this course, I had to practice.  This helped to make this course fun and exciting for a future in penetration testing.  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>This course focuses on tools and techniques involved in real-world cyber operations. It provides abroad range of cybersecurity concepts and essential hands-on training for students who want tobecome cybersecurity professionals. <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/joshuarussell\/cyse-301-cybersecurity-techniques-and-operations\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27002,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-json\/wp\/v2\/pages\/732"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-json\/wp\/v2\/users\/27002"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-json\/wp\/v2\/comments?post=732"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-json\/wp\/v2\/pages\/732\/revisions"}],"predecessor-version":[{"id":879,"href":"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-json\/wp\/v2\/pages\/732\/revisions\/879"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/joshuarussell\/wp-json\/wp\/v2\/media?parent=732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}