{"id":269,"date":"2026-03-09T00:50:59","date_gmt":"2026-03-09T00:50:59","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/?page_id=269"},"modified":"2026-03-09T03:50:23","modified_gmt":"2026-03-09T03:50:23","slug":"5-courses","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/5-courses\/","title":{"rendered":"5 Courses"},"content":{"rendered":"\n<p>CYSE 280 Windows System Management and Security<\/p>\n\n\n\n<p>Introduction: This course introduces tools and techniques used to configure, manage and implement Windows and its security-related features. Students will install, configure, manage and secure windows&#8217; client &amp; server operating systems, and related networking environment using a variety of software tools. This course also details how to mitigate malware threats, identify security issues by using auditing and the Advanced Threat Analysis feature in Windows Server, secure your virtualization platform, and use new deployment options for enhancing security. Topics include designing Active Directory, authentication for Windows, group security and policy, service security, remote access security, planning a public key infrastructure, securing file resources, Internet Protocol Security, and additional Windows security topics.&nbsp;<\/p>\n\n\n\n<p>Artifact: <\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/wp-content\/uploads\/sites\/40451\/2026\/03\/Homework-1-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Homework-1-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Reflection: This course taught me how to configure, install, manage, and secure windows operating systems. I learned how to implement proper security features like active directory, authentication methods, group policies, and public key infrastructure to protect systems. This course helped me understand how to identify security threats and apply proper strategies to secure a windows environment.<\/p>\n\n\n\n<p>CYSE 301 Cyber Techniques and operations<\/p>\n\n\n\n<p>Introduction: This course focuses on tools and techniques involved in real-world cyber operations. It provides a broad range of cybersecurity concepts and essential hands-on training for students who want to become cybersecurity professionals. Students will learn the basic cybersecurity discipline, underline the model computing environment, and practice different tools and strategies to perform cyber attacks and defense operations. After completing this course, students will be able to<\/p>\n\n\n\n<p>\u2022 understand the rules and laws involved in real-world cyber operations,<\/p>\n\n\n\n<p>\u2022 understand the basic components of the model computing networks, and take different<\/p>\n\n\n\n<p>techniques to identify and trace the network traffic if an instruction is detected inside a<\/p>\n\n\n\n<p>network<\/p>\n\n\n\n<p>\u2022 identify and evaluate the vulnerabilities in the network and implement effective<\/p>\n\n\n\n<p>countermeasures to protect the network from possible attacks<\/p>\n\n\n\n<p>\u2022 understand how to plan, organize and perform penetration testing on a network<\/p>\n\n\n\n<p>\u2022 understand different cryptographic protocols, tools, and mechanisms used for different<\/p>\n\n\n\n<p>systems, and exploit their weaknesses accordingly<\/p>\n\n\n\n<p>\u2022 manage data and personal information in a secure manner<\/p>\n\n\n\n<p>Artifact: <\/p>\n\n\n\n<p>Reflection:<\/p>\n\n\n\n<p>CYSE 300 Introduction to Cybersecurity<\/p>\n\n\n\n<p>Introduction: This course provides an overview of the field of cybersecurity. It covers core cybersecurity topics including computer system architectures, critical infrastructures, cyber threats and vulnerabilities, cryptography, information assurance, network security, and risk assessment and management. Students are expected to become familiar with fundamental security concepts, technologies, and practices, and develop a foundation for further study in cybersecurity.<\/p>\n\n\n\n<p>Artifact:<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/wp-content\/uploads\/sites\/40451\/2026\/03\/Microst-data-breach.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Microst-data-breach<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Reflection: This course taught me the basics of cybersecurity. I learned about key topics involving computer system architecture, cyber threats, cryptography, network security, and risk management. This course allowed me to build a strong foundation in cybersecurity concepts.<\/p>\n\n\n\n<p>CS 462\/562 Cybersecurity Fundamentals<\/p>\n\n\n\n<p>Introduction: Introduction to networking and the Internet protocol stack; Vulnerable protocols such as HTTP, DNS, and BGP; Overview of wireless communications, vulnerabilities, and security protocols; Introduction to cryptography; Discussion of cyber threats and defenses; Firewalls and IDS\/IPS; Kerberos; Transport Layer Security, including certificates; Network Layer Security.<\/p>\n\n\n\n<p>Artifact: <\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/wp-content\/uploads\/sites\/40451\/2026\/03\/Untitled-document-6.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Untitled-document-6<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Reflection: This course taught me the fundamentals of computer networking. I learned about wireless communications, cryptography, and important security features like firewalls. This course helped me understand common cyber threats and the proper mechanism to protect a network.<\/p>\n\n\n\n<p>CYSE 425 Cyber Strategy and Policy<\/p>\n\n\n\n<p>Introduction: This course explores cybersecurity policy and strategy and introduces students to the essentials of strategy development and policy making in cybersecurity. Topics considered include planning principles in cyber strategy; risk management and cybersecurity policy; the connections between cybersecurity policies, businesses, and governmental institutions; the knowledge, skills, and abilities needed to develop and implement cybersecurity policy; the social, political and ethical implications that arise in cybersecurity policies and strategies; strategies to assess cybersecurity policy; and the ties between national security and cybersecurity policy.<\/p>\n\n\n\n<p>Artifact:<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/wp-content\/uploads\/sites\/40451\/2026\/03\/Data-prevention-policy-1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Data-prevention-policy-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Reflection: This course helped me understand how national security policies relate to cybersecurity strategies. Taking this course showed me how cybersecurity policies impact political and social systems. Im am now able to analyze cybersecurity policies, analyze strategies, and recommend proper solutions to cybersecurity security challenges. This course allowed me to examine ethical challenges, international cyber conflict, and future developments in cybersecurity strategy and policy.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CYSE 280 Windows System Management and Security Introduction: This course introduces tools and techniques used to configure, manage and implement Windows and its security-related features. Students will install, configure, manage and secure windows&#8217; client &amp; server operating systems, and related networking environment using a variety of software tools. This course also details how to mitigate&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/5-courses\/\">Read More<\/a><\/div>\n","protected":false},"author":27462,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/wp-json\/wp\/v2\/pages\/269"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/wp-json\/wp\/v2\/users\/27462"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/wp-json\/wp\/v2\/comments?post=269"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/wp-json\/wp\/v2\/pages\/269\/revisions"}],"predecessor-version":[{"id":297,"href":"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/wp-json\/wp\/v2\/pages\/269\/revisions\/297"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/justin-gaither-electronic-portfolio-project\/wp-json\/wp\/v2\/media?parent=269"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}