{"id":895,"date":"2025-05-18T17:07:23","date_gmt":"2025-05-18T17:07:23","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/locky\/?page_id=895"},"modified":"2026-05-01T21:49:47","modified_gmt":"2026-05-01T21:49:47","slug":"it-315","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/locky\/coursework\/cybersecurity-applications\/it-315\/","title":{"rendered":"IT 315"},"content":{"rendered":"\n<h3 class=\"wp-block-heading has-text-align-center\"><strong>Course Grade Received: A<\/strong><\/h3>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\">Introduction to Networking and Security<\/h1>\n\n\n\n<p class=\"has-text-align-justify\">This course introduced foundational networking and cybersecurity concepts aligned with industry certifications such as CompTIA Network+ and Security+. Topics included network architecture, protocols, security principles, and system communication. While primarily theory-based, the course emphasized conceptual understanding of how networks operate and how security controls are applied in real-world environments.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83e\udde0 Cybersecurity Concepts in Practice<\/h2>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>This course strengthened my understanding of how networked systems communicate and how security principles are applied across infrastructure. I developed the ability to analyze network behavior, identify potential risks, and understand how protocols and configurations impact security posture.<\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udee1\ufe0f Core Frameworks &amp; Principles<\/h2>\n\n\n\n<ul>\n<li>OSI &amp; TCP\/IP models<\/li>\n\n\n\n<li>Network protocols (TCP, UDP, DNS, HTTP\/HTTPS)<\/li>\n\n\n\n<li>Basic network architecture &amp; design<\/li>\n\n\n\n<li>Security fundamentals (authentication, encryption, access control)<\/li>\n\n\n\n<li>Defense-in-depth concepts<\/li>\n\n\n\n<li>Introduction to Network+ \/ Security+ domains<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd0d Applied Knowledge &amp; Analysis<\/h2>\n\n\n\n<ul>\n<li>Analyzed network communication models and protocol behavior<\/li>\n\n\n\n<li>Evaluated security risks related to network configurations and data transmission<\/li>\n\n\n\n<li>Applied foundational security concepts to identify vulnerabilities in networked systems<\/li>\n\n\n\n<li>Interpreted how authentication, encryption, and access control mechanisms protect data<\/li>\n\n\n\n<li>Connected theoretical networking concepts to real-world cybersecurity scenarios<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83e\udde0 Security Mindset Development<\/h2>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p><\/p>\n<\/blockquote>\n\n\n\n<p>This course reinforced the importance of understanding network fundamentals as a prerequisite for effective cybersecurity, highlighting how misconfigurations and protocol weaknesses can introduce significant risk.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd17 Course Topics &amp; Coverage<\/h2>\n\n\n\n<ul>\n<li>Network architecture and design<\/li>\n\n\n\n<li>OSI and TCP\/IP models<\/li>\n\n\n\n<li>Network protocols and communication<\/li>\n\n\n\n<li>Basic network security concepts<\/li>\n\n\n\n<li>Authentication and encryption fundamentals<\/li>\n\n\n\n<li>Risk and vulnerability awareness<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83e\uddf0 Key Skills &amp; Topics<\/h2>\n\n\n\n<ul>\n<li>Networking Fundamentals<\/li>\n\n\n\n<li>Network Protocol Analysis<\/li>\n\n\n\n<li>Security Concepts (Authentication, Encryption)<\/li>\n\n\n\n<li>Risk Identification<\/li>\n\n\n\n<li>Network Architecture Understanding<\/li>\n\n\n\n<li>CompTIA Network+ \/ Security+ Alignment<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\">Course Material<\/h1>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><span style=\"text-decoration: underline\">Milestone Project \u2014&nbsp;Ethernet Network Design Project<\/span><\/h2>\n\n\n\n<p>Designed a complete Ethernet network infrastructure for a four-level building, including structured cabling, switching architecture, and security implementation. This project simulated a real-world network deployment scenario, requiring both technical design decisions and cost-performance tradeoff analysis.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd0d Project Highlights<\/h2>\n\n\n\n<ul>\n<li>Designed a <strong>hierarchical star topology<\/strong> with centralized equipment room and distributed telecommunications closets<\/li>\n\n\n\n<li>Planned and calculated <strong>148 network drops<\/strong> across a multi-floor environment<\/li>\n\n\n\n<li>Implemented <strong>Cat6 structured cabling<\/strong> with distance constraints aligned to industry standards<\/li>\n\n\n\n<li>Designed a <strong>fiber backbone (OM3 multimode)<\/strong> for scalability and high-speed interconnects<\/li>\n\n\n\n<li>Selected and integrated <strong>managed PoE switches<\/strong> for network segmentation and device support<\/li>\n\n\n\n<li>Configured a <strong>pfSense firewall (Netgate 6100)<\/strong> for network security, VLAN segmentation, and potential IDS\/IPS<\/li>\n\n\n\n<li>Integrated <strong>Wi-Fi 6 access points<\/strong> for modern wireless coverage<\/li>\n\n\n\n<li>Developed a <strong>cost-optimized bill of materials (~$13,591)<\/strong> balancing performance and budget<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83e\udde0 Applied Networking &amp; Security Concepts<\/h2>\n\n\n\n<ul>\n<li>Network topology design and hierarchical infrastructure<\/li>\n\n\n\n<li>Structured cabling standards (Cat6, ANSI\/TIA-568 alignment)<\/li>\n\n\n\n<li>VLAN segmentation and network isolation<\/li>\n\n\n\n<li>Firewall-based security architecture<\/li>\n\n\n\n<li>Scalability planning using fiber backbone<\/li>\n\n\n\n<li>Real-world budgeting and hardware selection<\/li>\n<\/ul>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Ethernet_Network_Design_Project_FD.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">Ethernet_Network_Design_Project_FD<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>\ud83d\udc49 <strong>Download Project Report (PDF)<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-1 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/12\/Ethernet_Network_Design_Project_FD.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen or Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\"><span style=\"text-decoration: underline\">IT Infrastructure: Internet of Things (IoT<\/span>)<\/h2>\n\n\n\n<p>\ud83d\udce1 An analysis of IoT&#8217;s role in modern IT infrastructure, examining how connected devices extend network attack surfaces, introduce unique authentication and firmware challenges, and require specialized security strategies beyond traditional enterprise controls.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/09\/IT-Infrastructure-and-IoT-FD.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">IT-Infrastructure-and-IoT-FD<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-2 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/09\/IT-Infrastructure-and-IoT-FD.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen or Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Covers advanced networking concepts including routing, switching, protocols, and system-level configuration in enterprise environments.<\/p>\n","protected":false},"author":30379,"featured_media":0,"parent":2309,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"advanced_seo_description":"Covers advanced networking concepts including routing, switching, protocols, and system-level configuration in enterprise environments.","jetpack_seo_html_title":"IT 315 Advanced Networking & Systems | ODU Portfolio","jetpack_seo_noindex":false,"footnotes":""},"jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/895"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/users\/30379"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/comments?post=895"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/895\/revisions"}],"predecessor-version":[{"id":2505,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/895\/revisions\/2505"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/2309"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/media?parent=895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}