{"id":254,"date":"2025-11-09T12:21:20","date_gmt":"2025-11-09T12:21:20","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jtaylor746\/?page_id=254"},"modified":"2025-11-30T22:42:57","modified_gmt":"2025-11-30T22:42:57","slug":"cyse-280","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jtaylor746\/cyse-280\/","title":{"rendered":"CYSE 301; Cybersecurity Techniques and Operations"},"content":{"rendered":"\n<p>CYSE 301 is a course designed to provide an introduction to what the technical side of the world of cybersecurity can be and allowed me to again gather the skills required to be technically proficient on the Windows operating system and the Linux operating systems. I chose to include both blue and red team artifacts demonstrating understanding and skills on both sides while also including skills in network traffic monitoring.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jtaylor746\/wp-content\/uploads\/sites\/40156\/2025\/11\/complete-Assignment-2.2-Traffic-Sniffing-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">complete-Assignment-2.2-Traffic-Sniffing-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>In the artifact above I am demonstrating understanding of how an attacker may sniff network traffic and steal data.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jtaylor746\/wp-content\/uploads\/sites\/40156\/2025\/11\/Assignment-3-Sword-vs.-Shield-1-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Assignment-3-Sword-vs.-Shield-1-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Above I am demonstrating both attacks and defenses of certain cybersecurity techniques. Scanning for traffic and setting up firewall policies. <\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jtaylor746\/wp-content\/uploads\/sites\/40156\/2025\/11\/Assignment-5-Password-Cracking-Part-A-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Assignment-5-Password-Cracking-Part-A-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>In this artifact I am demonstrating red team techniques in how to crack unsophisticated passwords in Kali Linux.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CYSE 301 is a course designed to provide an introduction to what the technical side of the world of cybersecurity can be and allowed me to again gather the skills required to be technically proficient on the Windows operating system&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jtaylor746\/cyse-280\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":27216,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jtaylor746\/wp-json\/wp\/v2\/pages\/254"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jtaylor746\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jtaylor746\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jtaylor746\/wp-json\/wp\/v2\/users\/27216"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jtaylor746\/wp-json\/wp\/v2\/comments?post=254"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/jtaylor746\/wp-json\/wp\/v2\/pages\/254\/revisions"}],"predecessor-version":[{"id":317,"href":"https:\/\/sites.wp.odu.edu\/jtaylor746\/wp-json\/wp\/v2\/pages\/254\/revisions\/317"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jtaylor746\/wp-json\/wp\/v2\/media?parent=254"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}