{"id":127,"date":"2021-09-20T01:21:54","date_gmt":"2021-09-20T01:21:54","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=127"},"modified":"2025-05-06T00:44:47","modified_gmt":"2025-05-06T00:44:47","slug":"cyse-407","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/samuelbaidoo\/cyse-407\/","title":{"rendered":"CYSE 315"},"content":{"rendered":"\n<p><strong>Introduction to CYSE 315: Networking for Cybersecurity<\/strong><\/p>\n\n\n\n<p>My CYSE 315 coursework established a comprehensive understanding of network architectures, protocols, and security mechanisms, forming the backbone of my ability to design, secure, and troubleshoot modern IT infrastructures. This course equipped me with hands-on expertise in configuring and defending networks against cyber threats while optimizing performance and reliability. Through labs, simulations, and real-world scenarios, I mastered the principles of data transmission, network segmentation, and threat detection\u2014skills critical for safeguarding organizational assets in an interconnected world.<\/p>\n\n\n\n<p><strong>Key Coursework Highlights:<\/strong><\/p>\n\n\n\n<ul>\n<li><strong>Network Design &amp; Security:<\/strong>&nbsp;Configured routers, switches, and firewalls to enforce secure communication channels, applying principles like VLAN segmentation and ACLs (Access Control Lists).<\/li>\n\n\n\n<li><strong>Protocol Analysis:<\/strong>&nbsp;Analyzed TCP\/IP, DNS, DHCP, and HTTP\/S protocols using&nbsp;<strong>Wireshark<\/strong>&nbsp;to identify vulnerabilities and anomalous traffic patterns.<\/li>\n\n\n\n<li><strong>Network Hardening:<\/strong>&nbsp;Implemented VPNs, intrusion detection\/prevention systems (IDS\/IPS), and encryption protocols (e.g., TLS) to protect data in transit.<\/li>\n\n\n\n<li><strong>Cybersecurity Integration:<\/strong>&nbsp;Simulated and mitigated network-based attacks (e.g., DDoS, ARP spoofing, man-in-the-middle) using tools like&nbsp;<strong>Nessus<\/strong>&nbsp;and&nbsp;<strong>Qualys<\/strong>&nbsp;for vulnerability assessments.<\/li>\n\n\n\n<li><strong>Cloud &amp; Hybrid Networks:<\/strong>&nbsp;Explored secure configurations for cloud environments (AWS\/Azure basics) and hybrid networks, emphasizing zero-trust architectures.<\/li>\n<\/ul>\n\n\n\n<p><strong>Integration with Professional Experience:<\/strong><br>This coursework directly complements my roles at EVMS and ODU Help Desk, where I resolved connectivity issues, deployed secure hardware (Dell\/HP), and mitigated phishing attacks. For example, my understanding of network traffic analysis (via Wireshark) enhanced my ability to diagnose user connectivity challenges and identify malicious activity. Additionally, my CompTIA Security+ certification reinforced foundational networking security principles, such as secure protocol configuration and risk management, which I applied in RMF compliance projects.  <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/samuelbaidoo\/wp-content\/uploads\/sites\/26169\/2025\/05\/annotated-Case20Analysis.docx.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of annotated-Case20Analysis.docx.\"><\/object><a id=\"wp-block-file--media-06065da2-9bb6-4316-9d20-45ecf1352f21\" href=\"https:\/\/sites.wp.odu.edu\/samuelbaidoo\/wp-content\/uploads\/sites\/26169\/2025\/05\/annotated-Case20Analysis.docx.pdf\">annotated-Case20Analysis.docx<\/a><a href=\"https:\/\/sites.wp.odu.edu\/samuelbaidoo\/wp-content\/uploads\/sites\/26169\/2025\/05\/annotated-Case20Analysis.docx.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-06065da2-9bb6-4316-9d20-45ecf1352f21\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Introduction to CYSE 315: Networking for Cybersecurity My CYSE 315 coursework established a comprehensive understanding of network architectures, protocols, and security mechanisms, forming the backbone of my ability to design, secure, and troubleshoot modern IT infrastructures. This course equipped me with hands-on expertise in configuring and defending networks against cyber threats while optimizing performance and&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/samuelbaidoo\/cyse-407\/\">Read More<\/a><\/div>\n","protected":false},"author":21983,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/samuelbaidoo\/wp-json\/wp\/v2\/pages\/127"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/samuelbaidoo\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/samuelbaidoo\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/samuelbaidoo\/wp-json\/wp\/v2\/users\/21983"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/samuelbaidoo\/wp-json\/wp\/v2\/comments?post=127"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/samuelbaidoo\/wp-json\/wp\/v2\/pages\/127\/revisions"}],"predecessor-version":[{"id":355,"href":"https:\/\/sites.wp.odu.edu\/samuelbaidoo\/wp-json\/wp\/v2\/pages\/127\/revisions\/355"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/samuelbaidoo\/wp-json\/wp\/v2\/media?parent=127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}