{"id":274,"date":"2025-04-23T17:37:01","date_gmt":"2025-04-23T17:37:01","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/mkenn270\/?page_id=274"},"modified":"2025-04-28T15:44:41","modified_gmt":"2025-04-28T15:44:41","slug":"cyse-301-cybersecurity-techniques-and-operations","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/mkenn270\/cyse-301-cybersecurity-techniques-and-operations\/","title":{"rendered":"CYSE 301"},"content":{"rendered":"\n<p><strong>Cybersecurity Techniques and Operations<\/strong><\/p>\n\n\n\n<p><strong>Course Background<\/strong><\/p>\n\n\n\n<p>This was a hands-on course that explores real-world cyber operations through offensive and defensive security practices. The course equips students with the technical and strategic skills essential for cybersecurity professionals, such as network traffic tracing, penetration testing, password cracking, wireless security, and digital steganography. It emphasizes active learning through practical lab work in a virtualized computing environment.<\/p>\n\n\n\n<p><strong>Assignment Reflection<\/strong><\/p>\n\n\n\n<p><span style=\"text-decoration: underline\"><strong>Basic Linux Commands Lab<\/strong><br><\/span>One of the foundational assignments I completed was Lab 1: Basic Linux Commands, where I used a Kali Linux VM in a controlled virtual lab environment (CCIA Hyper-V). This lab focused on practicing essential Linux terminal commands, skills critical in both offensive and defensive cybersecurity operations. The assignment was completed during the first few weeks of the semester, helping establish my comfort in a command-line interface early on. I successfully completed &#8220;Lab 1&#8221; and earned a score of 95% out of 100.<\/p>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:78% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"919\" height=\"651\" src=\"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-content\/uploads\/sites\/36270\/2025\/04\/Screen-Shot-2025-04-23-at-1.19.22-PM.png\" alt=\"\" class=\"wp-image-275 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-content\/uploads\/sites\/36270\/2025\/04\/Screen-Shot-2025-04-23-at-1.19.22-PM.png 919w, https:\/\/sites.wp.odu.edu\/mkenn270\/wp-content\/uploads\/sites\/36270\/2025\/04\/Screen-Shot-2025-04-23-at-1.19.22-PM-300x213.png 300w, https:\/\/sites.wp.odu.edu\/mkenn270\/wp-content\/uploads\/sites\/36270\/2025\/04\/Screen-Shot-2025-04-23-at-1.19.22-PM-768x544.png 768w, https:\/\/sites.wp.odu.edu\/mkenn270\/wp-content\/uploads\/sites\/36270\/2025\/04\/Screen-Shot-2025-04-23-at-1.19.22-PM-573x406.png 573w\" sizes=\"(max-width: 919px) 100vw, 919px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-media-text is-stacked-on-mobile\" style=\"grid-template-columns:78% auto\"><figure class=\"wp-block-media-text__media\"><img loading=\"lazy\" decoding=\"async\" width=\"840\" height=\"568\" src=\"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-content\/uploads\/sites\/36270\/2025\/04\/Screen-Shot-2025-04-23-at-1.19.48-PM.png\" alt=\"\" class=\"wp-image-276 size-full\" srcset=\"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-content\/uploads\/sites\/36270\/2025\/04\/Screen-Shot-2025-04-23-at-1.19.48-PM.png 840w, https:\/\/sites.wp.odu.edu\/mkenn270\/wp-content\/uploads\/sites\/36270\/2025\/04\/Screen-Shot-2025-04-23-at-1.19.48-PM-300x203.png 300w, https:\/\/sites.wp.odu.edu\/mkenn270\/wp-content\/uploads\/sites\/36270\/2025\/04\/Screen-Shot-2025-04-23-at-1.19.48-PM-768x519.png 768w, https:\/\/sites.wp.odu.edu\/mkenn270\/wp-content\/uploads\/sites\/36270\/2025\/04\/Screen-Shot-2025-04-23-at-1.19.48-PM-600x406.png 600w\" sizes=\"(max-width: 840px) 100vw, 840px\" \/><\/figure><div class=\"wp-block-media-text__content\">\n<p><\/p>\n<\/div><\/div>\n\n\n\n<p><strong>Relevance<\/strong><\/p>\n\n\n\n<p>Understanding basic Linux operations is critical for my cybersecurity career goals. Nearly all penetration testing and network analysis tools operate in a Linux environment. This experience not only supported my short-term academic success but also aligned with my long-term goal of working in cyber defense and red team engagements. It formed a technical foundation that will enable me to work with tools like Metasploit, Nmap, and Wireshark in more complex scenarios.<\/p>\n\n\n\n<p><strong>Explaining Commands<\/strong><\/p>\n\n\n\n<p><strong>pwd<\/strong>: for current directory <\/p>\n\n\n\n<p><strong>echo<\/strong>: with name and escape characters <\/p>\n\n\n\n<p><strong>cd<\/strong>: navigation Output of creating a file and a directory using touch and mkdir, and verifying them with ls -l <\/p>\n\n\n\n<p><strong>Output of copying and manipulating \/etc\/passwd<\/strong>: head -n 6 passwd_MIDAS grep &#8220;www&#8221; passwd_MIDAS<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Techniques and Operations Course Background This was a hands-on course that explores real-world cyber operations through offensive and defensive security practices. The course equips students with the technical and strategic skills essential for cybersecurity professionals, such as network traffic tracing, penetration testing, password cracking, wireless security, and digital steganography. It emphasizes active learning through &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/mkenn270\/cyse-301-cybersecurity-techniques-and-operations\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CYSE 301<\/span><\/a><\/p>\n","protected":false},"author":24729,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-json\/wp\/v2\/pages\/274"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-json\/wp\/v2\/users\/24729"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-json\/wp\/v2\/comments?post=274"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-json\/wp\/v2\/pages\/274\/revisions"}],"predecessor-version":[{"id":297,"href":"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-json\/wp\/v2\/pages\/274\/revisions\/297"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/mkenn270\/wp-json\/wp\/v2\/media?parent=274"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}