{"id":133,"date":"2025-08-20T20:24:57","date_gmt":"2025-08-20T20:24:57","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=133"},"modified":"2025-11-17T17:54:37","modified_gmt":"2025-11-17T17:54:37","slug":"it-cyse-200t-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/nrstephens\/it-cyse-200t-2\/","title":{"rendered":"CYSE 200T Coursework"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-center\">Course Overview:<\/h2>\n\n\n\n<p><strong>Fall 2025, Old Dominion University <\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center\">Cybersecurity, Technology, and Society (CYSE200T) examines cybersecurity from an interdisciplinary perspective, enabling students like me to directly relate class discussions to foundational cybersecurity concepts covered in my other courses. On this page, you will find a curated selection of coursework I completed in CYSE200T throughout my first semester at Old Dominion University, demonstrating my understanding of key cybersecurity principles and their application across multiple disciplines, with a focus on developing business writing skills for my professional career.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<h2 class=\"wp-block-heading has-text-align-center\">SCADA Systems Report<\/h2>\n\n\n\n<p class=\"has-text-align-center\"><em>This report provides a critical examination of SCADA systems within American Critical Infrastructure, focusing on key vulnerabilities associated with the system and offering mitigation strategies, such as VPNs and whitelisting.<\/em> <em>This assignment provided me with a basic and technical understanding of SCADA architecture, and allowed me to expand slightly into geopolitics, a subject I have a deep passion for.<\/em><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/nrstephens\/wp-content\/uploads\/sites\/39267\/2025\/11\/Final-SCADA-Systems-Completed-Write-Up-November-8-2025-3.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Final-SCADA-Systems-Completed-Write-Up-November-8-2025-3<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<h2 class=\"wp-block-heading has-text-align-center\">The Human Factor of Cybersecurity Report<\/h2>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<p class=\"has-text-align-center\"><em><em>In this assignment, students were tasked with assuming the role of a CISO to determine how to balance the acquisition and maintenance of cybersecurity technology with employee training on a limited budget, with no disclosed budget amount. This assignment required critical thinking in both business and cybersecurity contexts, involving research on common threats to inform the final budget decision.<\/em><\/em><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/nrstephens\/wp-content\/uploads\/sites\/39267\/2025\/11\/Corrected-Human-Factor-Write-Up.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Corrected-Human-Factor-Write-Up<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<h2 class=\"wp-block-heading has-text-align-center\">Port Scanning Report &#8211; Group Assignment<\/h2>\n\n\n\n<p class=\"has-text-align-center\"><em><em>An in-depth exploration of Port Scanning. Coupling artificial intelligence with human oversight and editing to create a professional write-up as quickly as possible. This assignment increased my awareness of the evolving standards and productivity levels that employers expect as AI continues to become more advanced.<\/em><\/em><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/nrstephens\/wp-content\/uploads\/sites\/39267\/2025\/11\/Completed-Port-Scanning-Write-Up-Updated.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Completed-Port-Scanning-Write-Up-Updated<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<h2 class=\"wp-block-heading has-text-align-center\">CIA Triad Breakdown Report<\/h2>\n\n\n\n<p class=\"has-text-align-center\"><em><em>An initial exploration of the CIA Triad. This report focuses on highlighting and clarifying the distinctions between availability and accessibility, while also examining the CIA Triad as a whole. This was an introductory assignment into the realm of cybersecurity, allowing me to gain an understanding of the key principles to adhere to when designing secure systems and maintaining operational resilience against cyber attacks.<\/em><\/em><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/nrstephens\/wp-content\/uploads\/sites\/39267\/2025\/11\/CYSE-200T-CIA-Triad-Write-Up-Complete.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE-200T-CIA-Triad-Write-Up-Complete<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n<\/div><\/div>\n<\/div><\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Course Overview: Fall 2025, Old Dominion University Cybersecurity, Technology, and Society (CYSE200T) examines cybersecurity from an interdisciplinary perspective, enabling students like me to directly relate class discussions to foundational cybersecurity concepts covered in my other courses. On this page, you will find a curated selection of coursework I completed in CYSE200T throughout my first semester &hellip; <a href=\"https:\/\/sites.wp.odu.edu\/nrstephens\/it-cyse-200t-2\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">CYSE 200T Coursework<\/span><\/a><\/p>\n","protected":false},"author":30730,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nrstephens\/wp-json\/wp\/v2\/pages\/133"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nrstephens\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nrstephens\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nrstephens\/wp-json\/wp\/v2\/users\/30730"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nrstephens\/wp-json\/wp\/v2\/comments?post=133"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/nrstephens\/wp-json\/wp\/v2\/pages\/133\/revisions"}],"predecessor-version":[{"id":362,"href":"https:\/\/sites.wp.odu.edu\/nrstephens\/wp-json\/wp\/v2\/pages\/133\/revisions\/362"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nrstephens\/wp-json\/wp\/v2\/media?parent=133"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}