top of page

CYSE 301- Cyber Techniques & Operations

This course introduces tools and techniques used to secure and analyze large computer networks and systems. Students will explore and map networks using a variety of diagnostic software tools, learn advanced packet analysis, configure firewalls, write intrusion detection rules, perform forensic investigation, and practice techniques for penetration testing.

Course Overview

This course taught several aspects of cyber operations using real-world scenarios through virtual machines and theory.  I learned how to use a different tools to analyze network traffic, identify vulnerabilities in the network and implement ways to secure the network, including adding Firewall rules.  I also learned techniques and tools to conduct penetration testing on a network.  Additionally, this class taught how to perform brute force and dictionary attacks, use metasploit to hack or insert malware into another computer.  

     I gained a lot of experience and practice from each and every lab we were assigned.  I also participated in the extra credit activities that allowed me to gain even more experience.  The professor of this course did not like to give you every answer or step to these labs because he wanted us to learn how to find innovative solutions.  This ties back into my skills I mentioned earlier in the course of being able to critically think and solve problems.  This was one of my favorite classes at ODU because I was able to learn how to actually use the programs and how to solve issues that arise along the way. 

     The following lab reports demonstrate the skills I learned in this course.   Each report includes screenshots and descriptions of each.  There were many lab reports throughout this course, so I have included the reports that demonstrate the most advanced skills.   

Course Overview

Traffic Analysis

The following lab report demonstrates the following skills: 

  • ​Using Tshark filters to capture specific packets.

  • Acting as the hacker and sniffing the local area network to intercept usernames and passwords.  

Network Scanning

The following lab report demonstrates the following skills: 

  • Nmap Scanning

  • Zenmap intensive network scanning

  • Using Firewall tables to apply rules 

  • Running a vulnerability scan using Nessus

Traffic Analysis
Network Scanning
Penetration Testing

Penetration Testing

The following lab report demonstrates the following skills: 

  • Using multiple tools to perform a penetration test on a Windows machine. 

bottom of page