{"id":228,"date":"2025-09-13T00:49:23","date_gmt":"2025-09-13T00:49:23","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/?page_id=228"},"modified":"2025-11-30T20:59:27","modified_gmt":"2025-11-30T20:59:27","slug":"my-thoughts-on-cyse-and-social-science-video","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/my-thoughts-on-cyse-and-social-science-video\/","title":{"rendered":"CYSE 270 Course"},"content":{"rendered":"\n<figure class=\"wp-block-gallery has-nested-images columns-default is-cropped wp-block-gallery-1 is-layout-flex wp-block-gallery-is-layout-flex\"><\/figure>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/kjhon-fletcher-command-linux-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of kjhon-fletcher-command-linux-1 Assignment 1.\"><\/object><a id=\"wp-block-file--media-feff97ad-28c7-40e5-8184-dac88d534552\" href=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/kjhon-fletcher-command-linux-1.pdf\">kjhon-fletcher-command-linux-1 Assignment 1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/kjhon-fletcher-command-linux-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-feff97ad-28c7-40e5-8184-dac88d534552\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_CYSE-270-Assignment-2-Working-with-Command-Line-1_compressed.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of pdf.net_CYSE-270-Assignment-2-Working-with-Command-Line-1_compressed.\"><\/object><a id=\"wp-block-file--media-6a331b50-9312-46e2-86dd-11c0df5436f2\" href=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_CYSE-270-Assignment-2-Working-with-Command-Line-1_compressed.pdf\">pdf.net_CYSE-270-Assignment-2-Working-with-Command-Line-1_compressed<\/a><a href=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_CYSE-270-Assignment-2-Working-with-Command-Line-1_compressed.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-6a331b50-9312-46e2-86dd-11c0df5436f2\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_assignment-three-working-with-VI-kjhon-fletcher-1_compressed.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of pdf.net_assignment-three-working-with-VI-kjhon-fletcher-1_compressed.\"><\/object><a id=\"wp-block-file--media-0dd40506-ce42-48c1-b585-e63c69e3c022\" href=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_assignment-three-working-with-VI-kjhon-fletcher-1_compressed.pdf\">pdf.net_assignment-three-working-with-VI-kjhon-fletcher-1_compressed<\/a><a href=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_assignment-three-working-with-VI-kjhon-fletcher-1_compressed.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-0dd40506-ce42-48c1-b585-e63c69e3c022\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_lab-4-kjhon-fletcher-1_compressed.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of pdf.net_lab-4-kjhon-fletcher-1_compressed.\"><\/object><a id=\"wp-block-file--media-199cc6d5-fb5b-403c-ab00-feeddc6d96af\" href=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_lab-4-kjhon-fletcher-1_compressed.pdf\">pdf.net_lab-4-kjhon-fletcher-1_compressed<\/a><a href=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_lab-4-kjhon-fletcher-1_compressed.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-199cc6d5-fb5b-403c-ab00-feeddc6d96af\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_assignment-5-password-cracking-kjhon-fletcher-1_compressed.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of pdf.net_assignment-5-password-cracking-kjhon-fletcher-1_compressed.\"><\/object><a id=\"wp-block-file--media-ab24e352-6333-48bf-b85c-2754e416b92d\" href=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_assignment-5-password-cracking-kjhon-fletcher-1_compressed.pdf\">pdf.net_assignment-5-password-cracking-kjhon-fletcher-1_compressed<\/a><a href=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_assignment-5-password-cracking-kjhon-fletcher-1_compressed.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-ab24e352-6333-48bf-b85c-2754e416b92d\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_CYSE-270-Linux-System-for-Cybersecurity-Lab-6-\u2013-File-Permission-kjhon-fletcher-1_compressed.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of pdf.net_CYSE-270-Linux-System-for-Cybersecurity-Lab-6-\u2013-File-Permission-kjhon-fletcher-1_compressed.\"><\/object><a id=\"wp-block-file--media-8079a2f3-cc96-4d8b-8732-7e8a38cc4537\" href=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_CYSE-270-Linux-System-for-Cybersecurity-Lab-6-\u2013-File-Permission-kjhon-fletcher-1_compressed.pdf\">pdf.net_CYSE-270-Linux-System-for-Cybersecurity-Lab-6-\u2013-File-Permission-kjhon-fletcher-1_compressed<\/a><a href=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_CYSE-270-Linux-System-for-Cybersecurity-Lab-6-\u2013-File-Permission-kjhon-fletcher-1_compressed.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-8079a2f3-cc96-4d8b-8732-7e8a38cc4537\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_lab-7-kjhon-fletcher-1_compressed.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of pdf.net_lab-7-kjhon-fletcher-1_compressed.\"><\/object><a id=\"wp-block-file--media-c01ae47f-23d7-4ae2-9762-a6766003199a\" href=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_lab-7-kjhon-fletcher-1_compressed.pdf\">pdf.net_lab-7-kjhon-fletcher-1_compressed<\/a><a href=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_lab-7-kjhon-fletcher-1_compressed.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-c01ae47f-23d7-4ae2-9762-a6766003199a\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_CYSE-270-Assignment-8-Shell-Scripting-1_compressed.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of pdf.net_CYSE-270-Assignment-8-Shell-Scripting-1_compressed.\"><\/object><a id=\"wp-block-file--media-1ffe7597-06df-4458-bb55-d149b5660a83\" href=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_CYSE-270-Assignment-8-Shell-Scripting-1_compressed.pdf\">pdf.net_CYSE-270-Assignment-8-Shell-Scripting-1_compressed<\/a><a href=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_CYSE-270-Assignment-8-Shell-Scripting-1_compressed.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-1ffe7597-06df-4458-bb55-d149b5660a83\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_CYSE-270-Linux-System-for-Cybersecurity-Assignment-9-1_compressed.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of pdf.net_CYSE-270-Linux-System-for-Cybersecurity-Assignment-9-1_compressed.\"><\/object><a id=\"wp-block-file--media-efc88203-96b5-45dc-ad1d-7c8be0703f94\" href=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_CYSE-270-Linux-System-for-Cybersecurity-Assignment-9-1_compressed.pdf\">pdf.net_CYSE-270-Linux-System-for-Cybersecurity-Assignment-9-1_compressed<\/a><a href=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/pdf.net_CYSE-270-Linux-System-for-Cybersecurity-Assignment-9-1_compressed.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-efc88203-96b5-45dc-ad1d-7c8be0703f94\">Download<\/a><\/div>\n\n\n\n<figure class=\"wp-block-image size-full\"><a href=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/Screenshot-2025-11-30-155717.png\"><img loading=\"lazy\" decoding=\"async\" width=\"1008\" height=\"1002\" src=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/Screenshot-2025-11-30-155717.png\" alt=\"\" class=\"wp-image-248\" srcset=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/Screenshot-2025-11-30-155717.png 1008w, https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/Screenshot-2025-11-30-155717-300x298.png 300w, https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/Screenshot-2025-11-30-155717-150x150.png 150w, https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/Screenshot-2025-11-30-155717-768x763.png 768w, https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/Screenshot-2025-11-30-155717-600x596.png 600w, https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-content\/uploads\/sites\/39549\/2025\/11\/Screenshot-2025-11-30-155717-945x939.png 945w\" sizes=\"(max-width: 1008px) 100vw, 1008px\" \/><\/a><\/figure>\n\n\n\n<p>In this lab, I learned how to properly calculate how to get the binary format of all of these categories. This was not challenging so much and was pretty straightforward once you got how it&#8217;s all done. Overall, this lab was pretty easy and nice.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this lab, I learned how to properly calculate how to get the binary format of all of these categories. This was not challenging so much and was pretty straightforward once you got how it&#8217;s all done. Overall, this lab&#8230; <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/my-thoughts-on-cyse-and-social-science-video\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":31362,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-json\/wp\/v2\/pages\/228"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-json\/wp\/v2\/users\/31362"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-json\/wp\/v2\/comments?post=228"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-json\/wp\/v2\/pages\/228\/revisions"}],"predecessor-version":[{"id":230,"href":"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-json\/wp\/v2\/pages\/228\/revisions\/230"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/kjhonfletcherse-portfolio\/wp-json\/wp\/v2\/media?parent=228"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}