{"id":273,"date":"2025-07-31T02:44:06","date_gmt":"2025-07-31T02:44:06","guid":{"rendered":"https:\/\/student.wp.odu.edu\/zabeb001\/?page_id=273"},"modified":"2025-07-31T07:46:37","modified_gmt":"2025-07-31T07:46:37","slug":"cybersecurity-techniques-and-operations","status":"publish","type":"page","link":"https:\/\/student.wp.odu.edu\/zabeb001\/cybersecurity-techniques-and-operations\/","title":{"rendered":"Cybersecurity Techniques and Operations"},"content":{"rendered":"\n<p><strong>Course Overview<\/strong><\/p>\n\n\n\n<p>This course taught me how real-world cyberattacks work and how to defend against them. I learned how to analyze network traffic, scan for vulnerabilities, and test systems using tools like Wireshark, Nmap, and Metasploit. We also practiced password cracking, looked at Wi-Fi security, and hid data with steganography. Most of the work was hands-on in a virtual lab, which made it easier to understand how everything connects. These skills have already helped me in my job, especially with threat modeling and identifying weaknesses in medical device systems.<\/p>\n\n\n\n<p><strong>Labs<\/strong><\/p>\n\n\n\n<p>Here are a few examples of the labs I completed in this class:<\/p>\n\n\n\n<ul>\n<li><a href=\"http:\/\/student.wp.odu.edu\/zabeb001\/wp-content\/uploads\/sites\/35306\/2025\/07\/Password-Cracking.pdf.docx\">Password Cracking<\/a><\/li>\n\n\n\n<li><a href=\"http:\/\/student.wp.odu.edu\/zabeb001\/wp-content\/uploads\/sites\/35306\/2025\/07\/Traffic-Tracing-and-Sniffing.docx\">Traffic Tracing and Sniffing<\/a><\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Course Overview This course taught me how real-world cyberattacks work and how to defend against them. I learned how to analyze network traffic, scan for vulnerabilities, and test systems using tools like Wireshark, Nmap, and Metasploit. We also practiced password cracking, looked at Wi-Fi security, and hid data with steganography. Most of the work was&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/student.wp.odu.edu\/zabeb001\/cybersecurity-techniques-and-operations\/\">Read More<\/a><\/div>\n","protected":false},"author":28351,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/pages\/273"}],"collection":[{"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/users\/28351"}],"replies":[{"embeddable":true,"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/comments?post=273"}],"version-history":[{"count":4,"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/pages\/273\/revisions"}],"predecessor-version":[{"id":372,"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/pages\/273\/revisions\/372"}],"wp:attachment":[{"href":"https:\/\/student.wp.odu.edu\/zabeb001\/wp-json\/wp\/v2\/media?parent=273"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}