{"id":517,"date":"2025-07-29T03:00:21","date_gmt":"2025-07-29T03:00:21","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jprosser91\/?page_id=517"},"modified":"2025-08-10T05:04:06","modified_gmt":"2025-08-10T05:04:06","slug":"cyse-450","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jprosser91\/cyse-450\/","title":{"rendered":"CYSE 450"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Ethical Hacking and Penetration Testing.<\/h2>\n\n\n\n<p>This course introduces the basic terminologies used in ethical hacking and useful tools in relation to penetration testing on Kali Linux. Students will learn to explore the vulnerabilities in various systems and operate the industry-leading tools and framework to perform penetration testing on different target systems.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Course Objectives<\/h3>\n\n\n\n<ul>\n<li>By the end of this course, students will be able to;<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Recognize the realm of network security.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; State and relate the basic terminology and concepts in network security.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Explain why people attack computers and networks.<\/li>\n\n\n\n<li>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Define the roles, responsibilities, and common challenges of security personnel to combat hackers successfully.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Explain the difference between hacking myths and hacking facts.<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Explain what a denial-of-service (DoS) attack is<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Describe the causes of DoS attacks<\/li>\n\n\n\n<li>\u00b7&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Describe the evolution of programming exploits<\/li>\n\n\n\n<li>\u00b7\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 Recognize Web server vulnerabilities\u00b7\u00a0Describe the steps in the identification of incidents<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Assignments<\/h2>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/Lab_report.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Lab_report<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>This is a good summary of the labs we completed in class. Each lab took roughly an hour to complete and instructed us how to conduct pentesting on older machines in a controlled VM. Since it was purely labs and testing, there are no real assignments to showcase.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ethical Hacking and Penetration Testing. This course introduces the basic terminologies used in ethical hacking and useful tools in relation to penetration testing on Kali Linux. Students will learn to explore the vulnerabilities in various systems and operate the industry-leading tools and framework to perform penetration testing on different target systems. Course Objectives Assignments This&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jprosser91\/cyse-450\/\">Read More<\/a><\/div>\n","protected":false},"author":22978,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":123,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/cyse-301\/","url_meta":{"origin":517,"position":0},"title":"CYSE 301","author":"jpros004","date":"January 12, 2022","format":false,"excerpt":"Cybersecurity Techniques and Operations This course introduces tools and techniques used to secure and analyze large computer networks and systems. Students will systematically learn C programming in the first part of the course, which forms a foundation for many cybersecurity operations, such as malware analysis, understanding network protocol stack, etc.\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":207,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/law-ethics\/phil-355e\/","url_meta":{"origin":517,"position":1},"title":"PHIL 355E","author":"jpros004","date":"January 12, 2022","format":false,"excerpt":"Cybersecurity Ethics This course examines ethical issues relevant to ethics for cybersecurity professionals, including privacy, professional code of conduct, practical conflicts between engineering ethics and business practices, individual and corporate social responsibility, ethical hacking, information warfare, and cyberwarfare. Students will gain a broad understanding of central issues in cyberethics and\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":480,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/cyse-462\/","url_meta":{"origin":517,"position":2},"title":"CYSE 462","author":"jpros004","date":"July 29, 2025","format":false,"excerpt":"Cybersecurity Fundamentals Course Overview This is the first course in the\u00a0Graduate Certificate Program in Cybersecurity. This course will introduce the networking and cybersecurity background that you'll need to succeed in the other courses in the certificate program. Cybersecurity emphasizes prevention of attacks that are perpetrated using the Internet. It includes\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/threatmap.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/threatmap.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/threatmap.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/threatmap.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/threatmap.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/sites.wp.odu.edu\/jprosser91\/wp-content\/uploads\/sites\/27654\/2025\/08\/threatmap.png?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":671,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/it-201\/","url_meta":{"origin":517,"position":3},"title":"IT 201","author":"jpros004","date":"July 31, 2025","format":false,"excerpt":"Introduction to Information Systems Course Description: Lecture 3 hours; 3 credits. An introduction to the major hardware\/software components of modern information systems. Topics include introduction to the history of computers, numbering systems conversion, system and application software, networks and the Internet. Additional topics include Information Systems and Systems Development Life\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":497,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/cyse-425w\/","url_meta":{"origin":517,"position":4},"title":"CYSE 425W","author":"jpros004","date":"July 29, 2025","format":false,"excerpt":"Cybersecurity Strategy andPolicy Course Description: This course explores cybersecurity policy and strategy and introduces students to the essentials ofstrategy development and policy making in cybersecurity. Topics considered include planning principlesin cyber strategy; risk management and cybersecurity policy; the connections between cybersecuritypolicies, businesses, and governmental institutions; the knowledge, skills, and abilities\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":525,"url":"https:\/\/sites.wp.odu.edu\/jprosser91\/it-363\/","url_meta":{"origin":517,"position":5},"title":"IT 363","author":"jpros004","date":"July 29, 2025","format":false,"excerpt":"SYSTEMS ANALYSIS & DESIGN Course Description This course provides an introduction to the analysis and design of information systems. Emphasis is placed upon the development of requirements that serve the business needs as well as the design of information systems. This course focus on the object-oriented approach of system analysis\u2026","rel":"","context":"Similar post","block_context":{"text":"Similar post","link":""},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages\/517"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/users\/22978"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/comments?post=517"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages\/517\/revisions"}],"predecessor-version":[{"id":778,"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/pages\/517\/revisions\/778"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jprosser91\/wp-json\/wp\/v2\/media?parent=517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}