{"id":123,"date":"2023-01-10T16:11:18","date_gmt":"2023-01-10T16:11:18","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2024-11-25T20:14:18","modified_gmt":"2024-11-25T20:14:18","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/cyse-301\/","title":{"rendered":"CYSE 301"},"content":{"rendered":"<h1 style=\"text-align: center\">Cybersecurity Techniques and Operations<\/h1>\n<p>This course introduces tools and techniques used to secure and analyze large computer networks and systems. Students will systematically learn C programming in the first part of the course, which forms a foundation for many cybersecurity operations, such as malware analysis, understanding network protocol stack, etc. In the second part, students will explore and map networks using a variety of diagnostic software tools, learn advanced packet analysis, configure firewalls, write intrusion detection rules, perform forensic investigation, and practice techniques for penetration testing. The objectives are:<\/p>\n<ul>\n<li>Understand the concepts and major constructs of the C programming language,<\/li>\n<li>Master the programming skills of the C programming language,<\/li>\n<li>Be able to analyze the C source code to infer the functionality of a given code segment, C function, C program etc,<\/li>\n<li>Grasp the needed techniques and skills to write a C program in cybersecurity operations such as a network protocol stack,<\/li>\n<li>Monitor and analyze network traffic. Identify and trace the traffic when intrusion is detected in the network,<\/li>\n<li>Identify and evaluate the vulnerabilities in the network and implement effective countermeasures to protect the network,<\/li>\n<li>Master the technologies to exploit the vulnerabilities in a remote system,<\/li>\n<li>Analyze the vulnerabilities in wireless communication network,<\/li>\n<li>Manage data and personal information in a secure manner.<\/li>\n<\/ul>\n\n\n<p class=\"has-large-font-size\"><strong>Course Work<\/strong>:<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-content\/uploads\/sites\/31888\/2024\/11\/Assignment-3-Sword-vs.-Shield-Fall2024-1-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-3-Sword-vs.-Shield-Fall2024-1-1.\"><\/object><a id=\"wp-block-file--media-08363934-7b70-4652-a28d-44a7948c1869\" href=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-content\/uploads\/sites\/31888\/2024\/11\/Assignment-3-Sword-vs.-Shield-Fall2024-1-1.pdf\">Assignment-3-Sword-vs.-Shield-Fall2024-1-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-content\/uploads\/sites\/31888\/2024\/11\/Assignment-3-Sword-vs.-Shield-Fall2024-1-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-08363934-7b70-4652-a28d-44a7948c1869\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-content\/uploads\/sites\/31888\/2024\/11\/Assignment-4-Password-Cracking.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-4-Password-Cracking.\"><\/object><a id=\"wp-block-file--media-5430cbc3-a577-402a-85b9-bbc0df417c5d\" href=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-content\/uploads\/sites\/31888\/2024\/11\/Assignment-4-Password-Cracking.pdf\">Assignment-4-Password-Cracking<\/a><a href=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-content\/uploads\/sites\/31888\/2024\/11\/Assignment-4-Password-Cracking.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-5430cbc3-a577-402a-85b9-bbc0df417c5d\">Download<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-content\/uploads\/sites\/31888\/2024\/11\/Lab-Assignment-4-Penetration-Testing-for-Windows.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Lab-Assignment-4-Penetration-Testing-for-Windows.\"><\/object><a id=\"wp-block-file--media-4bc449be-4dbb-4c39-af2c-79c33cd99451\" href=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-content\/uploads\/sites\/31888\/2024\/11\/Lab-Assignment-4-Penetration-Testing-for-Windows.pdf\">Lab-Assignment-4-Penetration-Testing-for-Windows<\/a><a href=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-content\/uploads\/sites\/31888\/2024\/11\/Lab-Assignment-4-Penetration-Testing-for-Windows.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-4bc449be-4dbb-4c39-af2c-79c33cd99451\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Techniques and Operations This course introduces tools and techniques used to secure and analyze large computer networks and systems. Students will systematically learn C programming in the first part of the course, which forms a foundation for many cybersecurity operations, such as malware analysis, understanding network protocol stack, etc. In the second part, students&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/cyse-301\/\">Read More<\/a><\/div>\n","protected":false},"author":25798,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/users\/25798"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":402,"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/pages\/123\/revisions\/402"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/marshalbrowneport\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}