{"id":123,"date":"2025-02-03T04:35:52","date_gmt":"2025-02-03T04:35:52","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2025-12-10T03:26:10","modified_gmt":"2025-12-10T03:26:10","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/kaustubhpatel\/cyse-301\/","title":{"rendered":"CYSE 301"},"content":{"rendered":"\n<p>Cybersecurity Techniques and Operations not only gave me the theoretical side but also the practical hand-on experience in the main cybersecurity practices, which were network analysis, penetration testing, password cracking, and digital forensics. During this course, I came to know the techniques of tracing network traffic, setting up firewalls, discovering system weaknesses, and using software like Wireshark, Nmap, Aircrack-ng, and steganography utilities. My participation in CYSE 301 helped me develop my skills in the areas of analyst thought process, complex security issue troubleshooting, and practical technique application in real-world cybersecurity operations.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/kaustubhpatel\/wp-content\/uploads\/sites\/38474\/2025\/12\/Assignment-4-\u2013-Ethical-_Hacking.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-4-\u2013-Ethical-_Hacking.\"><\/object><a id=\"wp-block-file--media-61059170-c593-4067-911e-ce8ddce52611\" href=\"https:\/\/sites.wp.odu.edu\/kaustubhpatel\/wp-content\/uploads\/sites\/38474\/2025\/12\/Assignment-4-\u2013-Ethical-_Hacking.pdf\">Assignment-4-\u2013-Ethical-_Hacking<\/a><a href=\"https:\/\/sites.wp.odu.edu\/kaustubhpatel\/wp-content\/uploads\/sites\/38474\/2025\/12\/Assignment-4-\u2013-Ethical-_Hacking.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-61059170-c593-4067-911e-ce8ddce52611\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/kaustubhpatel\/wp-content\/uploads\/sites\/38474\/2025\/12\/Assignment-5-Part-AB-Password-_Cracking.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-5-Part-AB-Password-_Cracking.\"><\/object><a id=\"wp-block-file--media-cb8f0b17-9359-4a8d-955c-811f650ac2be\" href=\"https:\/\/sites.wp.odu.edu\/kaustubhpatel\/wp-content\/uploads\/sites\/38474\/2025\/12\/Assignment-5-Part-AB-Password-_Cracking.pdf\">Assignment-5-Part-AB-Password-_Cracking<\/a><a href=\"https:\/\/sites.wp.odu.edu\/kaustubhpatel\/wp-content\/uploads\/sites\/38474\/2025\/12\/Assignment-5-Part-AB-Password-_Cracking.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-cb8f0b17-9359-4a8d-955c-811f650ac2be\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Techniques and Operations not only gave me the theoretical side but also the practical hand-on experience in the main cybersecurity practices, which were network analysis, penetration testing, password cracking, and digital forensics. During this course, I came to know the techniques of tracing network traffic, setting up firewalls, discovering system weaknesses, and using software &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/kaustubhpatel\/cyse-301\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CYSE 301<\/span><\/a><\/p>\n","protected":false},"author":30533,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kaustubhpatel\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kaustubhpatel\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kaustubhpatel\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kaustubhpatel\/wp-json\/wp\/v2\/users\/30533"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kaustubhpatel\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/kaustubhpatel\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":455,"href":"https:\/\/sites.wp.odu.edu\/kaustubhpatel\/wp-json\/wp\/v2\/pages\/123\/revisions\/455"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kaustubhpatel\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}