{"id":95,"date":"2022-10-19T17:30:04","date_gmt":"2022-10-19T17:30:04","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=95"},"modified":"2025-04-28T21:59:51","modified_gmt":"2025-04-28T21:59:51","slug":"cybersecurity-fundamentals","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/lashantig\/cybersecurity-fundamentals\/","title":{"rendered":"Cybersecurity Techniques and Operations"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Course Overview<\/h2>\n\n\n\n<p>This course provided hands-on training in cybersecurity tools, techniques, and real-world cyber operations. During this course, I learned to understand cybersecurity laws, analyze network structures, detect and respond to intrusions, perform penetration testing, work with cryptographic tools, and manage data securely. Below are various labs completed throughout the course.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/lashantig\/wp-content\/uploads\/sites\/30909\/2025\/04\/A1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of A1.\"><\/object><a id=\"wp-block-file--media-0d889365-69dc-4031-92d0-76d14385e48a\" href=\"https:\/\/sites.wp.odu.edu\/lashantig\/wp-content\/uploads\/sites\/30909\/2025\/04\/A1.pdf\">A1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/lashantig\/wp-content\/uploads\/sites\/30909\/2025\/04\/A1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-0d889365-69dc-4031-92d0-76d14385e48a\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/lashantig\/wp-content\/uploads\/sites\/30909\/2025\/04\/A6.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of A6.\"><\/object><a id=\"wp-block-file--media-723260da-0f50-4494-866c-332c60e493da\" href=\"https:\/\/sites.wp.odu.edu\/lashantig\/wp-content\/uploads\/sites\/30909\/2025\/04\/A6.pdf\">A6<\/a><a href=\"https:\/\/sites.wp.odu.edu\/lashantig\/wp-content\/uploads\/sites\/30909\/2025\/04\/A6.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-723260da-0f50-4494-866c-332c60e493da\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/lashantig\/wp-content\/uploads\/sites\/30909\/2025\/04\/A3.SWORDVSSHIELD.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of A3.SWORDVSSHIELD.\"><\/object><a id=\"wp-block-file--media-0daeacac-fb0a-4769-8d43-776aaacd9495\" href=\"https:\/\/sites.wp.odu.edu\/lashantig\/wp-content\/uploads\/sites\/30909\/2025\/04\/A3.SWORDVSSHIELD.pdf\">A3.SWORDVSSHIELD<\/a><a href=\"https:\/\/sites.wp.odu.edu\/lashantig\/wp-content\/uploads\/sites\/30909\/2025\/04\/A3.SWORDVSSHIELD.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-0daeacac-fb0a-4769-8d43-776aaacd9495\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Course Overview This course provided hands-on training in cybersecurity tools, techniques, and real-world cyber operations. During this course, I learned to understand cybersecurity laws, analyze network structures, detect and respond to intrusions, perform penetration testing, work with cryptographic tools, and manage data securely. Below are various labs completed throughout the course.<\/p>\n","protected":false},"author":25172,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/lashantig\/wp-json\/wp\/v2\/pages\/95"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/lashantig\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/lashantig\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lashantig\/wp-json\/wp\/v2\/users\/25172"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lashantig\/wp-json\/wp\/v2\/comments?post=95"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/lashantig\/wp-json\/wp\/v2\/pages\/95\/revisions"}],"predecessor-version":[{"id":549,"href":"https:\/\/sites.wp.odu.edu\/lashantig\/wp-json\/wp\/v2\/pages\/95\/revisions\/549"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/lashantig\/wp-json\/wp\/v2\/media?parent=95"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}