{"id":123,"date":"2022-01-13T03:40:51","date_gmt":"2022-01-13T03:40:51","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2025-04-05T15:55:20","modified_gmt":"2025-04-05T15:55:20","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/stevenday\/cyse-301\/","title":{"rendered":"Cybersecurity Techniques and Operations"},"content":{"rendered":"\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<ul>\n<li><strong>Week 1\u20132:<\/strong> Introduced the course environment and Linux basics. I learned how to navigate Linux using the command line and completed the first lab on basic Linux commands using the CCIA virtual lab.<\/li>\n\n\n\n<li><strong>Week 3\u20134:<\/strong> Focused on the OSI model, with emphasis on the Application, Transport, Network, and Data Link Layers. These weeks built foundational knowledge needed for understanding traffic flow and packet structure.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Network Traffic Analysis<\/strong><\/h4>\n\n\n\n<ul>\n<li><strong>Week 5:<\/strong> I used <strong>Wireshark<\/strong> to practice packet capture and analysis. This involved identifying different types of traffic, which laid the groundwork for understanding normal vs. suspicious activity.<\/li>\n\n\n\n<li><strong>Week 6:<\/strong> Reviewed prior material and prepared for Module 2, transitioning from analysis to protection and scanning.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Firewall and Network Scanning<\/strong><\/h4>\n\n\n\n<ul>\n<li><strong>Week 7:<\/strong> Learned how to set up and configure <strong>pfSense<\/strong> firewalls. I also practiced <strong>network scanning with Nmap<\/strong>, learning to identify open ports, running services, and potential vulnerabilities.<\/li>\n\n\n\n<li><strong>Module 2 Labs:<\/strong> Reinforced how attackers map networks and how defenders use firewalls to limit exposure.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Ethical Hacking and Penetration Testing<\/strong><\/h4>\n\n\n\n<ul>\n<li><strong>Week 8\u201310:<\/strong> Delved into <strong>ethical hacking<\/strong> and <strong>Windows penetration testing<\/strong> using tools like Metasploit. I explored how attackers escalate privileges and create payloads for testing system defenses.<\/li>\n\n\n\n<li><strong>Assignment 4:<\/strong> Demonstrated practical skills in ethical hacking and system exploitation in a controlled environment.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Wireless and Password Security<\/strong><\/h4>\n\n\n\n<ul>\n<li><strong>Week 11\u201312:<\/strong> Focused on <strong>password cracking techniques<\/strong> and <strong>wireless security<\/strong>. I learned how WEP and WPA are attacked using common tools, reinforcing the importance of secure configurations.<\/li>\n\n\n\n<li><strong>Assignments 5:<\/strong> Involved using tools to perform brute force attacks and crack Wi-Fi passwords in lab simulations.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Information Hiding and VPNs<\/strong><\/h4>\n\n\n\n<ul>\n<li><strong>Week 13:<\/strong> Introduced <strong>digital steganography<\/strong>, where I used tools like <em>steghide<\/em> to hide and extract messages in files.<\/li>\n\n\n\n<li><strong>Week 14:<\/strong> I configured my own <strong>VPN server<\/strong> using OpenVPN on Google Cloud Platform (GCP), learning how encrypted tunnels can secure remote communications.<\/li>\n<\/ul>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Final Preparation<\/strong><\/h4>\n\n\n\n<ul>\n<li><strong>Week 15:<\/strong> Focused on review and final exam preparation, reinforcing all concepts from traffic analysis to firewall configuration, hacking tools, password security, and secure network design.<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Skills and Competencies Gained<\/strong><\/h3>\n\n\n\n<ul>\n<li>Linux fundamentals and command line proficiency<\/li>\n\n\n\n<li>Packet analysis using Wireshark<\/li>\n\n\n\n<li>Nmap scanning and vulnerability detection<\/li>\n\n\n\n<li>pfSense firewall configuration<\/li>\n\n\n\n<li>Ethical hacking and penetration testing basics<\/li>\n\n\n\n<li>Password and wireless security (WEP\/WPA)<\/li>\n\n\n\n<li>Digital steganography and data hiding<\/li>\n\n\n\n<li>VPN setup and secure communications<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<p>This course provided not only theoretical knowledge but also valuable hands-on experience in real-world cybersecurity scenarios. By the end, I gained practical insight into both offensive (attacker) and defensive (defender) perspectives in network security.<\/p>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Network Traffic Analysis Firewall and Network Scanning Ethical Hacking and Penetration Testing Wireless and Password Security Information Hiding and VPNs Final Preparation Skills and Competencies Gained This course provided not only theoretical knowledge but also valuable hands-on experience in real-world cybersecurity scenarios. By the end, I gained practical insight into both offensive (attacker) and defensive&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/stevenday\/cyse-301\/\">Read More<\/a><\/div>\n","protected":false},"author":23014,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/stevenday\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/stevenday\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/stevenday\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/stevenday\/wp-json\/wp\/v2\/users\/23014"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/stevenday\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/stevenday\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":420,"href":"https:\/\/sites.wp.odu.edu\/stevenday\/wp-json\/wp\/v2\/pages\/123\/revisions\/420"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/stevenday\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}