{"id":604,"date":"2025-03-05T03:15:09","date_gmt":"2025-03-05T03:15:09","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/?page_id=604"},"modified":"2025-03-05T03:15:12","modified_gmt":"2025-03-05T03:15:12","slug":"cyse301-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/cyse301-2\/","title":{"rendered":"CYSE301"},"content":{"rendered":"\n<p>Course Description and Objectives:<\/p>\n\n\n\n<p>This course focuses on tools and techniques involved in real-world cyber operations. It provides a<br>broad range of cybersecurity concepts and essential hands-on training for students who want to<br>become cybersecurity professionals. Students will learn the basic cybersecurity discipline, underline<br>the model computing environment, and practice different tools and strategies to perform cyber<br>attacks and defense operations.<br>After completing this course, students will be able to: <br>\u2022 understand the rules and laws involved in real-world cyber operations,<br>\u2022 understand the basic components of the model computing networks, and take different<br>techniques to identify and trace the network traffic if an instruction is detected inside a<br>network,<br>\u2022 identify and evaluate the vulnerabilities in the network and implement effective countermeasures to protect the network from possible attacks,<br>\u2022 understand how to plan, organize and perform penetration testing on a network,<br>\u2022 understand different cryptographic protocols, tools, and mechanisms used for different<br>systems, and exploit their weaknesses accordingly,<br>\u2022 manage data and personal information in a secure manner<\/p>\n\n\n\n<p>Module 0. Linux Basic<br>\u2022 Introduce the basic Linux operation system<br>Module 1. Traffic Tracing and Analysis<br>\u2022 Introduce the basic computer network concepts<br>\u2022 Use Wireshark\/tshark to trace the network traffic<br>Module 2. Sword vs. Shield<br>\u2022 Setup pfSense Firewall<br>\u2022 Use NMAP to find vulnerabilities<br>Module 3. Penetration Test<br>\u2022 Introduce Metasploit Framework<br>\u2022 Enumerate system vulnerabilities and launch attacks on different attack vectors.<br>Module 4. Password Cracking<br>\u2022 Understand how passwords are stored in different systems<br>\u2022 Practice different tools to crack passwords<br>Module 5. Wireless Security<br>\u2022 Understand the vulnerabilities of the current Wi-Fi networks<br>\u2022 Practice different tools to crack and decrypt the Wi-Fi traffic<br>Module 6. Digital Steganography<br>\u2022 Understand the technical details of digital steganography.<br>\u2022 Use s-tool\/steghide to perform digital steganography<br>Course Schedule:<br>Please note that all students must follow the following course timeline, regardless of whether<br>you are registered for the sync or async online sessions.<br>L: Lecture, H: Hands-on<br>Week Topics Type<br>1 Module 0 \u2013 Course Introduction and Basic Linux Commands L&amp;H<br>2\/3\/4 Module 1 &#8211; Introduction to Computer network L<br>5 Module 1 &#8211; Traffic Tracing and Analysis H<br>6 Module 2 &#8211; Network Scanning L&amp;H<br>7 Module 2 &#8211; pfSense Firewall L&amp;H<br>8 Module 3 \u2013 Introduction to Ethical Hacking L<br>9\/10 Module 3 &#8211; Penetration Testing L&amp;H<br>11 Module 4 &#8211; Password Cracking H<br>12 Module 5 &#8211; Wi-Fi Password Cracking L<br>13 Module 6\u2013 Digital Steganography L&amp;H<br>14 Module X \u2013 extra module H<br>15 Review Sessions<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Course Description and Objectives: This course focuses on tools and techniques involved in real-world cyber operations. It provides abroad range of cybersecurity concepts and essential hands-on training for students who want tobecome cybersecurity professionals. Students will learn the basic cybersecurity discipline, underlinethe model computing environment, and practice different tools and strategies to perform cyberattacks and &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/cyse301-2\/\">Continue reading<\/a><\/p>\n","protected":false},"author":25235,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/pages\/604"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/users\/25235"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/comments?post=604"}],"version-history":[{"count":1,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/pages\/604\/revisions"}],"predecessor-version":[{"id":606,"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/pages\/604\/revisions\/606"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nadiaeportifolioids493\/wp-json\/wp\/v2\/media?parent=604"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}