{"id":362,"date":"2025-12-05T14:41:17","date_gmt":"2025-12-05T14:41:17","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/lf\/?page_id=362"},"modified":"2025-12-05T14:51:51","modified_gmt":"2025-12-05T14:51:51","slug":"network-planning","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/lf\/network-planning\/","title":{"rendered":"Ethical Hacking"},"content":{"rendered":"\n<p>During my time at Old Dominion University, I developed strong ethical hacking skills through structured coursework, lab exercises, and hands-on security assessments. I gained experience using industry tools to identify vulnerabilities, analyze system weaknesses, and understand how attackers exploit misconfigurations or insecure practices. Through guided labs and class projects, I practiced techniques such as password cracking, network scanning, reconnaissance, and secure exploitation always within a controlled, ethical framework. These experiences helped me build a practical understanding of penetration testing methodology and reinforced the importance of responsible disclosure, defense strategies, and overall cybersecurity best practices.<\/p>\n\n\n\n<p><a href=\"https:\/\/docs.google.com\/document\/d\/1_jiIn1YkZPV_OSLWubVgshirj2goB3-eCN_qZMIisfQ\/edit?tab=t.0\" data-type=\"link\" data-id=\"https:\/\/docs.google.com\/document\/d\/1_jiIn1YkZPV_OSLWubVgshirj2goB3-eCN_qZMIisfQ\/edit?tab=t.0\">Digital Steganography<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/docs.google.com\/document\/d\/1xzWNb-LX6tLg1LH3O7MvyR5g9wZRfZBw1-4e_I54WL4\/edit?tab=t.0\" data-type=\"link\" data-id=\"https:\/\/docs.google.com\/document\/d\/1xzWNb-LX6tLg1LH3O7MvyR5g9wZRfZBw1-4e_I54WL4\/edit?tab=t.0\">Sword vs. Shield<\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/docs.google.com\/document\/d\/1Smn5OpjyhH9-s25flZipViPrUxua0TIqmsE79b3rJwU\/edit?tab=t.0\" data-type=\"link\" data-id=\"https:\/\/docs.google.com\/document\/d\/1Smn5OpjyhH9-s25flZipViPrUxua0TIqmsE79b3rJwU\/edit?tab=t.0\">Ethical Hacking<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>During my time at Old Dominion University, I developed strong ethical hacking skills through structured coursework, lab exercises, and hands-on security assessments. I gained experience using industry tools to identify vulnerabilities, analyze system weaknesses, and understand how attackers exploit misconfigurations or insecure practices. Through guided labs and class projects, I practiced techniques such as password&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/lf\/network-planning\/\">Read More<\/a><\/div>\n","protected":false},"author":28274,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/lf\/wp-json\/wp\/v2\/pages\/362"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/lf\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/lf\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lf\/wp-json\/wp\/v2\/users\/28274"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/lf\/wp-json\/wp\/v2\/comments?post=362"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/lf\/wp-json\/wp\/v2\/pages\/362\/revisions"}],"predecessor-version":[{"id":369,"href":"https:\/\/sites.wp.odu.edu\/lf\/wp-json\/wp\/v2\/pages\/362\/revisions\/369"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/lf\/wp-json\/wp\/v2\/media?parent=362"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}