{"id":123,"date":"2025-01-22T00:08:27","date_gmt":"2025-01-22T00:08:27","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2026-03-22T14:15:53","modified_gmt":"2026-03-22T14:15:53","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/locky\/coursework\/cybersecurity-foundations\/cyse-301\/","title":{"rendered":"CYSE 301"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-center\"><strong>In-Progress Spring 2026<\/strong><\/h2>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n<h1 style=\"text-align: center\">Cybersecurity Techniques and Operations<\/h1>\n<p data-start=\"757\" data-end=\"1120\">Provides hands-on training in real-world cyber operations and defensive security techniques. The course emphasizes practical cybersecurity tools, vulnerability analysis, penetration testing, and network defense within a controlled lab environment.<\/p>\n<p data-start=\"1122\" data-end=\"1431\">Students engage directly with traffic tracing, firewall configuration, network scanning, exploitation frameworks, password cracking techniques, wireless security analysis, and digital steganography. The course bridges foundational networking knowledge with applied offensive and defensive security operations.<\/p>\n<p data-start=\"1433\" data-end=\"1616\">Through structured labs and applied exercises, CYSE 301 develops operational competency in identifying, analyzing, and mitigating vulnerabilities across modern computing environments.<\/p>\n<h2 style=\"text-align: center\" data-start=\"1480\" data-end=\"1857\"><strong>Key Skills &amp; Topics<\/strong><\/h2>\n<h3 data-start=\"1767\" data-end=\"1795\">Network Traffic Analysis<\/h3>\n<ul>\n<li data-start=\"1798\" data-end=\"1844\">Packet inspection using Wireshark and tshark<\/li>\n<li data-start=\"1847\" data-end=\"1894\">Traffic tracing and network behavior analysis<\/li>\n<li data-start=\"1897\" data-end=\"1960\">Identification of suspicious activity in network environments<\/li>\n<\/ul>\n<h3 data-start=\"1962\" data-end=\"1998\">Vulnerability Scanning &amp; Defense<\/h3>\n<ul>\n<li data-start=\"2001\" data-end=\"2029\">Network scanning with Nmap<\/li>\n<li data-start=\"2032\" data-end=\"2070\">Firewall configuration using pfSense<\/li>\n<li data-start=\"2073\" data-end=\"2111\">Evaluation of system vulnerabilities<\/li>\n<li data-start=\"2114\" data-end=\"2159\">Implementation of defensive countermeasures<\/li>\n<\/ul>\n<h3 data-start=\"2161\" data-end=\"2199\">Penetration Testing &amp; Exploitation<\/h3>\n<ul>\n<li data-start=\"2202\" data-end=\"2249\">Introduction to ethical hacking methodologies<\/li>\n<li data-start=\"2202\" data-end=\"2249\"><span style=\"font-size: revert;color: initial\">Metasploit Framework usage<\/span><\/li>\n<li data-start=\"2202\" data-end=\"2249\">Attack vector enumeration<\/li>\n<li data-start=\"2202\" data-end=\"2249\">Controlled exploitation techniques<\/li>\n<\/ul>\n<h3 data-start=\"2351\" data-end=\"2389\">Authentication &amp; Password Security<\/h3>\n<ul>\n<li data-start=\"2392\" data-end=\"2421\">Password storage mechanisms<\/li>\n<li data-start=\"2424\" data-end=\"2454\">Password cracking techniques<\/li>\n<li data-start=\"2457\" data-end=\"2489\">Wi-Fi security vulnerabilities<\/li>\n<li data-start=\"2492\" data-end=\"2529\">Wireless traffic decryption methods<\/li>\n<\/ul>\n<h3 data-start=\"2531\" data-end=\"2571\">Applied Cryptography &amp; Steganography<\/h3>\n<ul>\n<li data-start=\"2574\" data-end=\"2621\">Cryptographic tools and protocol fundamentals<\/li>\n<li data-start=\"2624\" data-end=\"2662\">Exploitation of weak implementations<\/li>\n<li data-start=\"2665\" data-end=\"2714\">Digital steganography using s-tool and steghide<\/li>\n<\/ul>\n\n\n<h1 class=\"wp-block-heading has-text-align-center\">Course Material<\/h1>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Password Cracking (System Users)<\/h2>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/03\/Assignment-5-Password-Cracking-System-Users-fd_2.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">Assignment-5-Password-Cracking-System-Users-fd_2<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-1 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/03\/Assignment-5-Password-Cracking-System-Users-fd_2.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen or Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Penetration Testing in Windows: Exploiting SMB Vulnerabilities<\/h2>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/03\/Lab-Assignment-4-Penetration-Testing-for-Windows-System-fd_4.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">Lab-Assignment-4-Penetration-Testing-for-Windows-System-fd_4<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-2 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/03\/Lab-Assignment-4-Penetration-Testing-for-Windows-System-fd_4.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen or Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Sword vs. Shield: Network Scanning and Firewall Security<\/h2>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/02\/Assignment3_Sword_vs_Shield_EC_fd_3_4.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">Assignment3_Sword_vs_Shield_EC_fd_3_4<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-3 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/02\/Assignment3_Sword_vs_Shield_EC_fd_3_4.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen or Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Traffic Tracing &amp; Network Packet Analysis<\/h2>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/02\/CYSE301_Week2_HW_fd_Batch-Compress.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">CYSE301_Week2_HW_fd_Batch-Compress<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-4 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2026\/02\/CYSE301_Week2_HW_fd_Batch-Compress.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen or Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>CYSE 301 coursework at Old Dominion University covering cybersecurity foundations, risk assessment, network defense, and security analysis projects.<\/p>\n","protected":false},"author":30379,"featured_media":0,"parent":95,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"advanced_seo_description":"CYSE 301 coursework at Old Dominion University covering cybersecurity foundations, risk assessment, network defense, and security analysis projects.","jetpack_seo_html_title":"CYSE 301 | Cybersecurity Foundations | ODU Portfolio","jetpack_seo_noindex":false,"footnotes":""},"jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/users\/30379"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":2182,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/123\/revisions\/2182"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/95"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}