{"id":138,"date":"2025-04-05T13:53:03","date_gmt":"2025-04-05T13:53:03","guid":{"rendered":"https:\/\/student.wp.odu.edu\/bhami014\/?page_id=138"},"modified":"2025-04-28T21:37:53","modified_gmt":"2025-04-28T21:37:53","slug":"cyse-301","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/bhami014\/cyse-301\/","title":{"rendered":"CYSE 301"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-center\">Cybersecurity Techniques and Operations<\/h2>\n\n\n\n<p>Cybersecurity Techniques and Operations, CYSE 301, encapsulates much of the tools and practices that would be used by cybersecurity professionals. This class provided a virtual environment, almost like a playground, to use kali linux to use real-world operations and concepts via hands-on learning. This allowed for students to learn about the rules and laws involved with cyber operations, how to evaluate vulnerabilities of networks, and what countermeasures can be used to protect the network from attacks. All of these practices help to manage data in a secure manner and ultimately helps understand what can be done in the professional field.<\/p>\n\n\n<div class=\"wp-block-image\">\n<figure class=\"aligncenter size-full\"><a href=\"https:\/\/student.wp.odu.edu\/bhami014\/wp-content\/uploads\/sites\/34716\/2025\/04\/annotated-bhami014.jpg\"><img loading=\"lazy\" decoding=\"async\" width=\"375\" height=\"286\" src=\"https:\/\/student.wp.odu.edu\/bhami014\/wp-content\/uploads\/sites\/34716\/2025\/04\/annotated-bhami014.jpg\" alt=\"\" class=\"wp-image-151\" srcset=\"https:\/\/student.wp.odu.edu\/bhami014\/wp-content\/uploads\/sites\/34716\/2025\/04\/annotated-bhami014.jpg 375w, https:\/\/student.wp.odu.edu\/bhami014\/wp-content\/uploads\/sites\/34716\/2025\/04\/annotated-bhami014-300x229.jpg 300w, https:\/\/student.wp.odu.edu\/bhami014\/wp-content\/uploads\/sites\/34716\/2025\/04\/annotated-bhami014-126x96.jpg 126w\" sizes=\"(max-width: 375px) 100vw, 375px\" \/><\/a><\/figure><\/div>\n\n\n<p><\/p>\n\n\n\n<p>The image above may look normal, but during this class, you learn how to encrypt and embed information into images using steganography which is very interesting because it can provide ideas on how information can be transmitted secretly. Through this class you get to learn how to use the appropriate tools to encrypt\/decrypt situations just like this one, and the concept and practice is truly satisfying when all of the pieces are put into place and working as intended.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Other works<\/h2>\n\n\n\n<p>These are some other works that were completed in the course that present the commands and practices we were able to perform within the Linux VM. These ideas allowed us to use offensive and defensive procedures and showed students how password cracking can be performed using these systems. All of the assignments provide insight into the tools and how they are used. This class gives a multitude of knowledge and skill with how cybersecurity operates in the real world.<\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file aligncenter\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/bhami014\/wp-content\/uploads\/sites\/34716\/2025\/04\/annotated-Assignement3ShieldvsSword-compressed.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Defensive and Offensive Techniques.\"><\/object><a id=\"wp-block-file--media-544308af-bead-42c4-8115-6107d763975c\" href=\"https:\/\/student.wp.odu.edu\/bhami014\/wp-content\/uploads\/sites\/34716\/2025\/04\/annotated-Assignement3ShieldvsSword-compressed.pdf\">Defensive and Offensive Techniques<\/a><a href=\"https:\/\/student.wp.odu.edu\/bhami014\/wp-content\/uploads\/sites\/34716\/2025\/04\/annotated-Assignement3ShieldvsSword-compressed.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-544308af-bead-42c4-8115-6107d763975c\">Download<\/a><\/div>\n\n\n\n<p><\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file aligncenter\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/student.wp.odu.edu\/bhami014\/wp-content\/uploads\/sites\/34716\/2025\/04\/annotated-Assignement5PasswordCracking-compressed-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Password Cracking.\"><\/object><a id=\"wp-block-file--media-8fee776a-eb72-498b-8dc8-1b021d553078\" href=\"https:\/\/student.wp.odu.edu\/bhami014\/wp-content\/uploads\/sites\/34716\/2025\/04\/annotated-Assignement5PasswordCracking-compressed-1.pdf\">Password Cracking<\/a><a href=\"https:\/\/student.wp.odu.edu\/bhami014\/wp-content\/uploads\/sites\/34716\/2025\/04\/annotated-Assignement5PasswordCracking-compressed-1.pdf\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-8fee776a-eb72-498b-8dc8-1b021d553078\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Techniques and Operations Cybersecurity Techniques and Operations, CYSE 301, encapsulates much of the tools and practices that would be used by cybersecurity professionals. This class provided a virtual environment, almost like a playground, to use kali linux to use real-world operations and concepts via hands-on learning. This allowed for students to learn about the [&hellip;]<\/p>\n","protected":false},"author":27877,"featured_media":188,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/bhami014\/wp-json\/wp\/v2\/pages\/138"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/bhami014\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/bhami014\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/bhami014\/wp-json\/wp\/v2\/users\/27877"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/bhami014\/wp-json\/wp\/v2\/comments?post=138"}],"version-history":[{"count":5,"href":"https:\/\/student.wp.odu.edu\/bhami014\/wp-json\/wp\/v2\/pages\/138\/revisions"}],"predecessor-version":[{"id":288,"href":"https:\/\/student.wp.odu.edu\/bhami014\/wp-json\/wp\/v2\/pages\/138\/revisions\/288"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/bhami014\/wp-json\/wp\/v2\/media\/188"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/bhami014\/wp-json\/wp\/v2\/media?parent=138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}