{"id":123,"date":"2022-01-12T14:55:05","date_gmt":"2022-01-12T14:55:05","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2025-07-31T02:14:55","modified_gmt":"2025-07-31T02:14:55","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jprosser91\/cyse-301\/","title":{"rendered":"CYSE 301"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Cybersecurity Techniques and Operations<\/h1>\n\n\n\n<p>This course introduces tools and techniques used to secure and analyze large computer networks and systems. Students will systematically learn C programming in the first part of the course, which forms a foundation for many cybersecurity operations, such as malware analysis, understanding network protocol stack, etc. In the second part, students will explore and map networks using a variety of diagnostic software tools, learn advanced packet analysis, configure firewalls, write intrusion detection rules, perform forensic investigation, and practice techniques for penetration testing. The objectives are:<\/p>\n\n\n\n<ul>\n<li>Understand the concepts and major constructs of the C programming language,<\/li>\n\n\n\n<li>Master the programming skills of the C programming language,<\/li>\n\n\n\n<li>Be able to analyze the C source code to infer the functionality of a given code segment, C function, C program etc,<\/li>\n\n\n\n<li>Grasp the needed techniques and skills to write a C program in cybersecurity operations such as a network protocol stack,<\/li>\n\n\n\n<li>Monitor and analyze network traffic. Identify and trace the traffic when intrusion is detected in the network,<\/li>\n\n\n\n<li>Identify and evaluate the vulnerabilities in the network and implement effective countermeasures to protect the network,<\/li>\n\n\n\n<li>Master the technologies to exploit the vulnerabilities in a remote system,<\/li>\n\n\n\n<li>Analyze the vulnerabilities in wireless communication network,<\/li>\n\n\n\n<li>Manage data and personal information in a secure manner.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Assignments<\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\"><div class=\"ead-preview\"><div class=\"ead-document\" style=\"position: relative;padding-top: 90%;\"><div class=\"ead-iframe-wrapper\"><iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fsites.wp.odu.edu%2Fjprosser91%2Fwp-content%2Fuploads%2Fsites%2F27654%2F2025%2F07%2Fassignment-4.pdf&amp;embedded=true&amp;hl=en\" title=\"Embedded Document\" class=\"ead-iframe\" style=\"width: 100%;height: 100%;border: none;position: absolute;left: 0;top: 0;visibility: hidden;\"><\/iframe><\/div>\t\t\t<div class=\"ead-document-loading\" style=\"width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;\">\n\t\t\t\t<div class=\"ead-loading-wrap\">\n\t\t\t\t\t<div class=\"ead-loading-main\">\n\t\t\t\t\t\t<div class=\"ead-loading\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/loading.svg\" width=\"55\" height=\"55\" alt=\"Loader\">\n\t\t\t\t\t\t\t<span>Loading&#8230;<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"ead-loading-foot\">\n\t\t\t\t\t\t<div class=\"ead-loading-foot-title\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/EAD-logo.svg\" alt=\"EAD Logo\" width=\"36\" height=\"23\"\/>\n\t\t\t\t\t\t\t<span>Taking too long?<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t<div class=\"ead-document-btn ead-reload-btn\" role=\"button\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/reload.svg\" alt=\"Reload\" width=\"12\" height=\"12\"\/> Reload document\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<span>|<\/span>\n\t\t\t\t\t\t\t<a href=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/07\/assignment-4.pdf\" class=\"ead-document-btn\" target=\"_blank\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/open.svg\" alt=\"Open\" width=\"12\" height=\"12\"\/> Open in new tab\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><\/div>\n\n<div class=\"ead-preview\"><div class=\"ead-document\" style=\"position: relative;padding-top: 90%;\"><div class=\"ead-iframe-wrapper\"><iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fsites.wp.odu.edu%2Fjprosser91%2Fwp-content%2Fuploads%2Fsites%2F27654%2F2025%2F07%2FCyberwarfare-Threats-to-Critical-Infrastructure.docx&amp;embedded=true&amp;hl=en\" title=\"Embedded Document\" class=\"ead-iframe\" style=\"width: 100%;height: 100%;border: none;position: absolute;left: 0;top: 0;visibility: hidden;\"><\/iframe><\/div>\t\t\t<div class=\"ead-document-loading\" style=\"width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;\">\n\t\t\t\t<div class=\"ead-loading-wrap\">\n\t\t\t\t\t<div class=\"ead-loading-main\">\n\t\t\t\t\t\t<div class=\"ead-loading\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/loading.svg\" width=\"55\" height=\"55\" alt=\"Loader\">\n\t\t\t\t\t\t\t<span>Loading&#8230;<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"ead-loading-foot\">\n\t\t\t\t\t\t<div class=\"ead-loading-foot-title\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/EAD-logo.svg\" alt=\"EAD Logo\" width=\"36\" height=\"23\"\/>\n\t\t\t\t\t\t\t<span>Taking too long?<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t<div class=\"ead-document-btn ead-reload-btn\" role=\"button\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/reload.svg\" alt=\"Reload\" width=\"12\" height=\"12\"\/> Reload document\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<span>|<\/span>\n\t\t\t\t\t\t\t<a href=\"https:\/\/docs.google.com\/viewer?url=https%3A%2F%2Fsites.wp.odu.edu%2Fjprosser91%2Fwp-content%2Fuploads%2Fsites%2F27654%2F2025%2F07%2FCyberwarfare-Threats-to-Critical-Infrastructure.docx&#038;hl=en\" class=\"ead-document-btn\" target=\"_blank\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/open.svg\" alt=\"Open\" width=\"12\" height=\"12\"\/> Open in new tab\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:50%\"><div class=\"ead-preview\"><div class=\"ead-document\" style=\"position: relative;padding-top: 90%;\"><div class=\"ead-iframe-wrapper\"><iframe src=\"\/\/docs.google.com\/viewer?url=https%3A%2F%2Fsites.wp.odu.edu%2Fjprosser91%2Fwp-content%2Fuploads%2Fsites%2F27654%2F2025%2F07%2FExtra-credit.docx&amp;embedded=true&amp;hl=en\" title=\"Embedded Document\" class=\"ead-iframe\" style=\"width: 100%;height: 100%;border: none;position: absolute;left: 0;top: 0;visibility: hidden;\"><\/iframe><\/div>\t\t\t<div class=\"ead-document-loading\" style=\"width:100%;height:100%;position:absolute;left:0;top:0;z-index:10;\">\n\t\t\t\t<div class=\"ead-loading-wrap\">\n\t\t\t\t\t<div class=\"ead-loading-main\">\n\t\t\t\t\t\t<div class=\"ead-loading\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/loading.svg\" width=\"55\" height=\"55\" alt=\"Loader\">\n\t\t\t\t\t\t\t<span>Loading&#8230;<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"ead-loading-foot\">\n\t\t\t\t\t\t<div class=\"ead-loading-foot-title\">\n\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/EAD-logo.svg\" alt=\"EAD Logo\" width=\"36\" height=\"23\"\/>\n\t\t\t\t\t\t\t<span>Taking too long?<\/span>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t<div class=\"ead-document-btn ead-reload-btn\" role=\"button\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/reload.svg\" alt=\"Reload\" width=\"12\" height=\"12\"\/> Reload document\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<span>|<\/span>\n\t\t\t\t\t\t\t<a href=\"https:\/\/docs.google.com\/viewer?url=https%3A%2F%2Fsites.wp.odu.edu%2Fjprosser91%2Fwp-content%2Fuploads%2Fsites%2F27654%2F2025%2F07%2FExtra-credit.docx&#038;hl=en\" class=\"ead-document-btn\" target=\"_blank\">\n\t\t\t\t\t\t\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/plugins\/embed-any-document\/images\/open.svg\" alt=\"Open\" width=\"12\" height=\"12\"\/> Open in new tab\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div><\/div><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Techniques and Operations This course introduces tools and techniques used to secure and analyze large computer networks and systems. Students will systematically learn C programming in the first part of the course, which forms a foundation for many cybersecurity operations, such as malware analysis, understanding network protocol stack, etc. In the second part, students&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jprosser91\/cyse-301\/\">Read More<\/a><\/div>\n","protected":false},"author":22978,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":517,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/cyse-450\/","url_meta":{"origin":123,"position":0},"title":"CYSE 450","author":"jpros004","date":"July 29, 2025","format":false,"excerpt":"Ethical Hacking and Penetration Testing. This course introduces the basic terminologies used in ethical hacking and useful tools in relation to penetration testing on Kali Linux. Students will learn to explore the vulnerabilities in various systems and operate the industry-leading tools and framework to perform penetration testing on different target\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":492,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/it-205\/","url_meta":{"origin":123,"position":1},"title":"IT 205","author":"jpros004","date":"July 29, 2025","format":false,"excerpt":"Introduction to Object-Oriented Programming (Python) Course Overview Lecture 3 hours; 3 credits; IT required core course.An introductory course on object-oriented programming that emphasizes problem solving for businessapplications. The programming language is Java, Python, or instructor\u2019s choice. Topics include simple datatypes, selections, loops, methods, arrays, classes, inheritance, etc. Course Objectives The\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":525,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/it-363\/","url_meta":{"origin":123,"position":2},"title":"IT 363","author":"jpros004","date":"July 29, 2025","format":false,"excerpt":"SYSTEMS ANALYSIS & DESIGN Course Description This course provides an introduction to the analysis and design of information systems. Emphasis is placed upon the development of requirements that serve the business needs as well as the design of information systems. This course focus on the object-oriented approach of system analysis\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":149,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/skills\/","url_meta":{"origin":123,"position":3},"title":"Skills","author":"jpros004","date":"January 12, 2022","format":false,"excerpt":"Essential Work Habits Include artifacts here that demonstrate your\u00a0 experience with some of the abilities listed below. Examples of artifacts you might include: comments on papers\/exams; test grades; internship comments) Ability to work methodically and is very detail oriented Eagerness to dig into technical questions and examine them from all\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":671,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/it-201\/","url_meta":{"origin":123,"position":4},"title":"IT 201","author":"jpros004","date":"July 31, 2025","format":false,"excerpt":"Introduction to Information Systems Course Description: Lecture 3 hours; 3 credits. An introduction to the major hardware\/software components of modern information systems. Topics include introduction to the history of computers, numbering systems conversion, system and application software, networks and the Internet. Additional topics include Information Systems and Systems Development Life\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":516,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/cyse-270\/","url_meta":{"origin":123,"position":5},"title":"CYSE 270","author":"jpros004","date":"July 29, 2025","format":false,"excerpt":"Linux System for Cybersecurity This course introduces the basic operations in major Linux distros for cybersecurity using both graphical interface and command-line interface. Students will learn about the basic installation and configuration, file systems management, shell scripts, and user authentication in Linux systems Assignments","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/users\/22978"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":658,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages\/123\/revisions\/658"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}