{"id":123,"date":"2022-09-20T20:48:29","date_gmt":"2022-09-20T20:48:29","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=123"},"modified":"2025-04-24T03:39:01","modified_gmt":"2025-04-24T03:39:01","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/tk001\/it-cyse-200t\/cyse-301\/","title":{"rendered":"CYSE 301"},"content":{"rendered":"\n<p class=\"has-text-align-center has-large-font-size\">Cybersecurity Techniques and Operations<\/p>\n\n\n\n<p>This course introduces tools and techniques used to secure and analyze large computer networks and systems. I had to explore and map networks using a variety of diagnostic software tools, learn advanced packet analysis, configure firewalls, write intrusion detection rules, perform forensic investigation, and practice techniques for penetration testing. One of my most memorable assignments I\u2019ve completed in the course was to configure my own VPN server.<\/p>\n\n\n\n<p>This course helped me to develop various technical skills and traits throughout its completion. For instance, using I started developing my skills with virtual machines, virtual private networks, packet tracers, nmap, and Linux. Additionally, I was able to develop my understanding and experience with various problem-solving sequences such as password cracking and steganography along with crafting various tools and environments such as building my own VPN server.<\/p>\n\n\n\n<p>Each assignment was a hands-on experience based on each module topic. Assignment 3 was known as \u201csword and shield\u201d which dealt with us using nmap to scan and \u201cattack\u201d information systems then using firewall settings to \u201cdefend\u201d information systems. Assignment 5 was a combination of module #4, \u201cLinux password cracking\u201d and module #5, \u201cWI-FI password cracking\u201d. This assignment had us use virtual machines to enact various simulated password attacks ranging from Linux software, Windows software, and Wi-Fi tools. Lastly, Assignment #7 known as \u201cmake your own VPN server\u201d\u00a0 had us setup our own google cloud platform to host our own VPN server and use a third party software tool to connect to it.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>The paper below is my Assignment #7 paper for Cyse 301. I learned to create my own VPN server in our final assignment of the course. I gained some skillful knowledge of using google cloud platform and provisioning it to create the host for the VPN server then using a third party service to connect to it. This assignment increased my cloud computing configuration skills and coding skills.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2025\/04\/Assignment-7-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-7-1.\"><\/object><a id=\"wp-block-file--media-12f4665e-6ea8-478f-8af8-812be87b9c9f\" href=\"https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2025\/04\/Assignment-7-1.pdf\">Assignment-7-1<\/a><a href=\"https:\/\/sites.wp.odu.edu\/tk001\/wp-content\/uploads\/sites\/30550\/2025\/04\/Assignment-7-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-12f4665e-6ea8-478f-8af8-812be87b9c9f\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Techniques and Operations This course introduces tools and techniques used to secure and analyze large computer networks and systems. I had to explore and map networks using a variety of diagnostic software tools, learn advanced packet analysis, configure firewalls, write intrusion detection rules, perform forensic investigation, and practice techniques for penetration testing. One of&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/tk001\/it-cyse-200t\/cyse-301\/\">Read More<\/a><\/div>\n","protected":false},"author":24905,"featured_media":0,"parent":91,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/tk001\/wp-json\/wp\/v2\/pages\/123"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/tk001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/tk001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tk001\/wp-json\/wp\/v2\/users\/24905"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tk001\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/tk001\/wp-json\/wp\/v2\/pages\/123\/revisions"}],"predecessor-version":[{"id":566,"href":"https:\/\/sites.wp.odu.edu\/tk001\/wp-json\/wp\/v2\/pages\/123\/revisions\/566"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/tk001\/wp-json\/wp\/v2\/pages\/91"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/tk001\/wp-json\/wp\/v2\/media?parent=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}