{"id":123,"date":"2024-01-24T18:03:53","date_gmt":"2024-01-24T18:03:53","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2024-04-24T22:30:20","modified_gmt":"2024-04-24T22:30:20","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/pm1\/cyse-301\/","title":{"rendered":"CYSE 301"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Cybersecurity Techniques and Operations<\/h1>\n\n\n\n<h1 class=\"wp-block-heading\">Course Description<\/h1>\n\n\n\n<p>This course focuses on tools and techniques involved in real-world cyber operations. It provides a<br>broad range of cybersecurity concepts and essential hands-on training for students who want to<br>become cybersecurity professionals. Students will learn the basic cybersecurity discipline, underline<br>the model computing environment, and practice different tools and strategies to perform cyber<br>attacks and defense operations.<br>After completing this course, students will be able to<br>\u2022 understand the rules and laws involved in real-world cyber operations,<br>\u2022 understand the basic components of the model computing networks, and take different<br>techniques to identify and trace the network traffic if an instruction is detected inside a<br>network,<br>\u2022 identify and evaluate the vulnerabilities in the network and implement effective countermeasures to protect the network from possible attacks,<br>\u2022 understand how to plan, organize and perform penetration testing on a network,<br>\u2022 understand different cryptographic protocols, tools, and mechanisms used for different<br>systems, and exploit their weaknesses accordingly,<br>\u2022 manage data and personal information in a secure manner.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Course Material<\/h1>\n\n\n\n<h3 class=\"wp-block-heading\">Basic Linux Commands<\/h3>\n\n\n\n<p>This assignment was an introduction to the COVA CCI interface for cyber students. This lab taught me how to configure virtual machines and went through basic Linux commands.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/pm1\/wp-content\/uploads\/sites\/35619\/2024\/04\/CYSE301_Lab1.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE301_Lab1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Traffic Tracing and Sniffing<\/h3>\n\n\n\n<p>This assignment was the introduction to basic computer network concepts. It had us use Wireshark as a way to trace and sniff network traffic through different protocols.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/pm1\/wp-content\/uploads\/sites\/35619\/2024\/04\/CYSE301_Lab2.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE301_Lab2<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Sword and Shield<\/h3>\n\n\n\n<p>This assignment was a mix between offense and defense, as the title mentions. For this, I was introduced further to pfSense firewalls and how to set them up. The nmap command was used to assist in finding any vulnerabilities that the system may have had.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/pm1\/wp-content\/uploads\/sites\/35619\/2024\/04\/CYSE301_Lab3.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">CYSE301_Lab3<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Techniques and Operations Course Description This course focuses on tools and techniques involved in real-world cyber operations. It provides abroad range of cybersecurity concepts and essential hands-on training for students who want tobecome cybersecurity professionals. Students will learn the basic cybersecurity discipline, underlinethe model computing environment, and practice different tools and strategies to perform&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/pm1\/cyse-301\/\">Read More<\/a><\/div>\n","protected":false},"author":27146,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/users\/27146"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":484,"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/pages\/123\/revisions\/484"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/pm1\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}