{"id":123,"date":"2022-09-16T13:00:03","date_gmt":"2022-09-16T13:00:03","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2025-03-21T03:49:46","modified_gmt":"2025-03-21T03:49:46","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/nir\/cyse-301\/","title":{"rendered":"CYSE 301"},"content":{"rendered":"<h1 style=\"text-align: center\">Cybersecurity Techniques and Operations<\/h1>\n<p>This course focuses on tools and techniques involved in real-world cyber operations. It provides a broad range of cybersecurity concepts and essential hands-on training that has helped us learn the basic understanding of cybersecurity discipline, underline the model computing environment, and practice with different tools and strategies to perform cyber attacks and defense operations.\u00a0<\/p>\n<p>Skills gained from this course include:<\/p>\n<ul>\n<li>Understanding the rules and laws involved within real-world cyber operations.\u00a0<\/li>\n<li>Understand the basic components of the model computing networks, and take different techniques to identify and trace the network traffic if an instruction is detected inside a network<\/li>\n<li>Identify and evaluate the vulnerabilities in the network and implement effective countermeasures to protect the network form possible attacks<\/li>\n<li>Understand how to plan, organize and perform penetration testing on a network<\/li>\n<li>Understand different cryptographic protocols, tools, and mechanisms used for different systems, and exploit their weaknesses accordingly<\/li>\n<li>Manage data and personal information in a secure manner<\/li>\n<\/ul>\n<h1>Course Material<\/h1>\n<p>The hands-on labs are as follows:<\/p>\n<ol>\n<li>Traffic tracing through Wireshark and TCPdump<\/li>\n<li>Firewall configuration with pfSense<\/li>\n<li>Penetration test on Windows<\/li>\n<li>Password cracking<\/li>\n<li>Information hidin<\/li>\n<\/ol>\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Assignment-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-2.\"><\/object><a id=\"wp-block-file--media-ff716f94-0043-40f4-8a62-a2a6dbaa079f\" href=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Assignment-2.pdf\">Assignment-2<\/a><a href=\"https:\/\/sites.wp.odu.edu\/nir\/wp-content\/uploads\/sites\/30465\/2024\/04\/Assignment-2.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-ff716f94-0043-40f4-8a62-a2a6dbaa079f\">Download<\/a><\/div>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Techniques and Operations This course focuses on tools and techniques involved in real-world cyber operations. It provides a broad range of cybersecurity concepts and essential hands-on training that has helped us learn the basic understanding of cybersecurity discipline, underline the model computing environment, and practice with different tools and strategies to perform cyber attacks&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nir\/cyse-301\/\">Read More<\/a><\/div>\n","protected":false},"author":24833,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/users\/24833"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":470,"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/pages\/123\/revisions\/470"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}