CYSE 301

Cybersecurity Techniques and Operations

This course focuses on tools and techniques involved in realworld cyber operations. It provides a broad range of cybersecurity concepts and essential hands-on training for students who want to become cybersecurity professionals. Students will learn the basic cybersecurity discipline, underline the model computing environment, and practice different tools and strategies to perform cyberattacks and defense operations. The following are the course objectives:

  • Understand the rules and laws involved in real-world cyber operations,
  • Understand the basic components of the model computing networks and take different
    techniques to identify and trace the network traffic if an instruction is detected inside a
    network,
  • Identify and evaluate the vulnerabilities in the network and implement effective countermeasures to protect the network from possible attacks,
  • Understand how to plan, organize, and perform penetration testing on a network,
  • Understand different cryptographic protocols, tools, and mechanisms used for different
    systems and exploit their weaknesses accordingly,
  • Manage data and personal information in a secure manner.

Course Material

This course required the completion of six hands-on lab assignments, which are as follows:

  1. Review of Linux commands
  2. Traffic capture and analysis using Wireshark
  3. Network scanning and firewall configuration
  4. Ethical hacking using Metasploit
  5. Password cracking using John the Ripper and aircrack-ng
  6. Digital steganography and hiding information with steghide

Examples of Course Work

Example 1

PDF Embedder requires a url attribute

Example 2

PDF Embedder requires a url attribute