Skip to content

Justin Prosser

Cybersecurity Portfolio

  • About Me
    • Resume
    • Skills
    • Certifications
    • Contact
  • Cybersecurity Foundations
    • CYSE 300 – Introduction to Cybersecurity
    • CYSE 301 – Cybersecurity Techniques and Operations
    • CS 462 – Cybersecurity Fundamentals
  • Tech & Society
    • CYSE 200T – Cybersecurity, Technology, and Society
    • CYSE 201S – Cyber Security and the Social Sciences
    • CYSE 426 – Cyber War
  • Law & Ethics
    • PHIL 355E – Cybersecurity Ethics
    • CYSE 406 – Cyber Law
    • CYSE 425W – Cybersecurity Strategy and Policy
  • Internship
    • CYSE 368 – Cybersecurity Internship
    • IDS 493 – IDS Electronic Portfolio Project
  • Cybersecurity Applications
    • IT 205 – Basic Cybersecurity Programming and Networking
    • CYSE 270 – Linux System for Cybersecurity
    • CYSE 450 – Ethical Hacking and Penetration Testing
    • CS 464 – Networked System Security
  • Research and Writing
    • ENG 231C – Introduction to Technical & Scientific Writing
    • IDS 300W – Interdisciplinary Theory and Concepts
  • Information systems & Technology
    • IT 201 – Intro to Information Systems
    • IT 315 – Introduction to Networking and Security
    • IT 363 – Systems Analysis and Design
    • IT 425 – Information Systems for International Business
    • IT 450 – Database Concepts

Resume

Loader Loading…
EAD Logo Taking too long?

Reload Reload document
| Open Open in new tab

RSS Cybersecurity & Infrastructure Security Agency

  • CISA Adds Four Known Exploited Vulnerabilities to Catalog April 24, 2026
    CISA has added four new vulnerabilities to its Known Exploited Vulnerabilities (KEV) Catalog, based on evidence of active exploitation. CVE-2024-7399 Samsung MagicINFO 9 Server Path Traversal Vulnerability CVE-2024-57726 SimpleHelp Missing Authorization Vulnerability CVE-2024-57728 SimpleHelp Path Traversal Vulnerability CVE-2025-29635 D-Link DIR-823X Command Injection Vulnerability  These types of vulnerabilities are frequent attack vectors for malicious cyber actors and pose significant risks to the federal enterprise.  Binding Operational Directive (BOD) 22-01: […]
    CISA
  • Github
  • Linkedin
Proudly powered by WordPress | Theme: Dyad by WordPress.com.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept