{"id":320,"date":"2025-01-27T20:05:22","date_gmt":"2025-01-27T20:05:22","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/locky\/?page_id=320"},"modified":"2026-03-22T15:37:16","modified_gmt":"2026-03-22T15:37:16","slug":"cyse-250","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/locky\/coursework\/cybersecurity-foundations\/cyse-250\/","title":{"rendered":"CYSE 250"},"content":{"rendered":"\n<h3 class=\"wp-block-heading has-text-align-center\">Course Grade Received: A<\/h3>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\">Basic Cybersecurity Networking &amp; Programming (aka, Python)<\/h1>\n\n\n\n<p>This course introduced foundational cybersecurity and networking concepts through hands-on programming. Emphasis was placed on Python scripting, Linux environments, and automation techniques used to analyze, secure, and manage systems. Practical labs reinforced real-world applications such as packet analysis, system monitoring, and secure coding practices.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd17 Course Topics &amp; Practical Foundations<\/h2>\n\n\n\n<ul>\n<li>Developed an understanding of <strong>networking fundamentals<\/strong>, including LAN\/WAN environments and OSI\/TCP-IP models<\/li>\n\n\n\n<li>Applied knowledge of <strong>network protocols and IP addressing<\/strong>, including subnetting and secure communication design<\/li>\n\n\n\n<li>Explored <strong>network hardware and infrastructure<\/strong>, including routers, switches, and access points through simulation tools<\/li>\n\n\n\n<li>Introduced <strong>network security concepts<\/strong>, including vulnerability assessment and basic defensive strategies<\/li>\n\n\n\n<li>Built foundational <strong>Python programming skills<\/strong> for cybersecurity applications, including scripting and automation<\/li>\n\n\n\n<li>Applied <strong>control flow, data structures, and functions<\/strong> to develop reusable code for security-related tasks<\/li>\n\n\n\n<li>Implemented <strong>file handling and object-oriented programming (OOP)<\/strong> concepts in Python<\/li>\n\n\n\n<li>Developed <strong>client-server applications using socket programming<\/strong>, enabling secure communication between systems<\/li>\n<\/ul>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<h2 class=\"wp-block-heading\">Key Skills &amp; Topics<\/h2>\n\n\n\n<ul>\n<li>Python for cybersecurity (automation, parsing, scripting)<\/li>\n\n\n\n<li>Linux command line &amp; system administration<\/li>\n\n\n\n<li>Network fundamentals (TCP\/IP, DNS, sockets)<\/li>\n\n\n\n<li>Packet analysis &amp; traffic inspection<\/li>\n\n\n\n<li>Bash scripting &amp; task automation<\/li>\n\n\n\n<li>Secure coding principles<\/li>\n\n\n\n<li>Debugging and troubleshooting<\/li>\n<\/ul>\n<\/div><\/div>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\">Course Material<\/h1>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">\ud83e\uddea Milestone Project \u2014 Secure File Sharing System<\/h2>\n\n\n\n<p class=\"has-text-align-center\"><em>Technologies: Python, Socket Programming, CLI, Encryption (Caesar Cipher)<\/em><\/p>\n\n\n\n<p>Developed a secure file sharing system using Python, implementing core cybersecurity principles through a TCP-based client-server architecture. The system integrates encryption, authentication, and file isolation to ensure secure data handling and controlled user access.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd0d Project Highlights<\/h2>\n\n\n\n<ul>\n<li>Built a <strong>TCP client-server architecture<\/strong> using Python socket programming<\/li>\n\n\n\n<li>Implemented <strong>user authentication system<\/strong> with persistent credential handling<\/li>\n\n\n\n<li>Applied <strong>encryption\/decryption (Caesar cipher)<\/strong> for secure data transmission<\/li>\n\n\n\n<li>Designed <strong>isolated file storage per user<\/strong> to enforce access control<\/li>\n\n\n\n<li>Developed <strong>command-line interface (CLI)<\/strong> for user interaction and system navigation<\/li>\n\n\n\n<li>Managed file operations including upload, retrieval, and storage securely<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd10 Security Concepts Applied<\/h2>\n\n\n\n<ul>\n<li>Secure client-server communication<\/li>\n\n\n\n<li>Basic encryption and data protection<\/li>\n\n\n\n<li>Authentication and access control<\/li>\n\n\n\n<li>File system security and isolation<\/li>\n\n\n\n<li>Input handling and system interaction<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83e\udde0 What This Project Demonstrates<\/h2>\n\n\n\n<p>This project demonstrates the ability to translate cybersecurity concepts into a working system, combining networking, programming, and security principles into a functional application.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\uddbc\ufe0f System Demonstration<\/h2>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-large\"><a href=\"https:\/\/github.com\/CLochstampfor60\/file_system_project\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" width=\"1000\" height=\"1000\" data-attachment-id=\"1737\" data-permalink=\"https:\/\/sites.wp.odu.edu\/locky\/coursework\/cybersecurity-foundations\/cyse-250\/secure_file_sharing_system_thumbnail\/\" data-orig-file=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Secure_File_Sharing_System_thumbnail.jpg?fit=471%2C556&amp;ssl=1\" data-orig-size=\"471,556\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Secure_File_Sharing_System_thumbnail\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Secure_File_Sharing_System_thumbnail.jpg?fit=300%2C300&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Secure_File_Sharing_System_thumbnail.jpg?fit=1000%2C1000&amp;ssl=1\" src=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Secure_File_Sharing_System_thumbnail-1024x1024.jpg?resize=1000%2C1000&#038;ssl=1\" alt=\"\" class=\"wp-image-1737\" srcset=\"https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Secure_File_Sharing_System_thumbnail.jpg?resize=1024%2C1024&amp;ssl=1 1024w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Secure_File_Sharing_System_thumbnail.jpg?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Secure_File_Sharing_System_thumbnail.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Secure_File_Sharing_System_thumbnail.jpg?resize=1536%2C1536&amp;ssl=1 1536w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Secure_File_Sharing_System_thumbnail.jpg?resize=2048%2C2048&amp;ssl=1 2048w, https:\/\/i0.wp.com\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Secure_File_Sharing_System_thumbnail.jpg?resize=144%2C144&amp;ssl=1 144w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" data-recalc-dims=\"1\" \/><\/a><\/figure><\/div>\n\n\n<p class=\"has-text-align-center\"><em>Click Image or Button to view source code and implementation details on GitHub.<\/em><\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-1 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #000000; \" class=\"wp-social-link wp-social-link-chain has-white-color has-black-background-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"https:\/\/github.com\/CLochstampfor60\/file_system_project\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">View Source Code on GitHub<\/span><\/a><\/li><\/ul>\n<\/div><\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><span style=\"text-decoration: underline\">Python &#8212; Files Assignment<\/span><\/h2>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-center is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:100%\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\"><a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/10\/FilesAssignment-fd-2.0.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">FilesAssignment-fd-2.0<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-content-justification-center is-nowrap is-layout-flex wp-container-core-group-layout-6 wp-block-group-is-layout-flex\">\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-2 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/10\/FilesAssignment-fd-2.0.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen or Download<\/span><\/a><\/li><\/ul>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-3 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #000000; \" class=\"wp-social-link wp-social-link-chain has-white-color has-black-background-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"https:\/\/github.com\/CLochstampfor60\/File_Assignment\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">GitHub Repository<\/span><\/a><\/li><\/ul>\n<\/div>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Hands-on cybersecurity and networking programming using Python, Linux, and scripting for automation, analysis, and secure system operations.<\/p>\n","protected":false},"author":30379,"featured_media":0,"parent":95,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"advanced_seo_description":"Hands-on cybersecurity and networking programming using Python, Linux, and scripting for automation, analysis, and secure system operations.","jetpack_seo_html_title":"CYSE 250 Cybersecurity & Networking Programming | ODU","jetpack_seo_noindex":false,"footnotes":"[]"},"jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/320"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/users\/30379"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/comments?post=320"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/320\/revisions"}],"predecessor-version":[{"id":2248,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/320\/revisions\/2248"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/95"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/media?parent=320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}