{"id":417,"date":"2024-12-16T19:24:09","date_gmt":"2024-12-16T19:24:09","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/abcyber\/?page_id=417"},"modified":"2024-12-16T20:40:10","modified_gmt":"2024-12-16T20:40:10","slug":"cs-462","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/abcyber\/cs-462\/","title":{"rendered":"CS 462"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-text-align-center\">Cybersecurity Fundamentals<\/h1>\n\n\n\n<p>Introduction to networking and the Internet protocol stack; Vulnerable protocols such as HTTP, DNS, and BGP; Overview of wireless communications, vulnerabilities, and security protocols; Introduction to cryptography; Discussion of cyber threats and defenses; Firewalls and  IDS\/IPS; Kerberos; Transport Layer Security, including certificates;  Network Layer Security. The following are the course objectives follows: <\/p>\n\n\n\n<ul>\n<li>Gain experience with the online course system.<\/li>\n\n\n\n<li>Explain the general architecture of the Internet, including the main functions of end systems and routers.<\/li>\n\n\n\n<li>Describe the basic client-server architecture and how typical network applications (web, email) fit into the architecture.<\/li>\n\n\n\n<li>Explain how web pages are requested and delivered using HTTP.<\/li>\n\n\n\n<li>Explain in general how DNS enables our use of the Internet and, in particular, how hosts determine the IP address of network servers.<\/li>\n\n\n\n<li>Explain how MAC addresses are used and assigned to a packet as it traverses a network.<\/li>\n\n\n\n<li>Differentiate between wireless LANs and wired LANs.<\/li>\n\n\n\n<li>Explain how IP CIDR addressing is performed and how an IP address is assigned from a group of available addresses.<\/li>\n\n\n\n<li>Explain the core functions of TCP including details of connection setup.<\/li>\n\n\n\n<li>Analyze and differentiate among types of malware and attacks.<\/li>\n\n\n\n<li>Analyze and differentiate among types of wireless attacks and application attacks.<\/li>\n\n\n\n<li>Identify vulnerabilities potentially present in DNS, databases, and web applications.<\/li>\n\n\n\n<li>Summarize general cryptography concepts.<\/li>\n\n\n\n<li>Describe how certificates can be used for authentication and encryption.<\/li>\n\n\n\n<li>Explain how firewalls and VPNs can be used to protect a network.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Course Material<\/h2>\n\n\n\n<p>This course consisted of 15 modules with various lab activities. Some examples of topics covered in these labs are as follows:<\/p>\n\n\n\n<ul>\n<li>HTTP operation, including understanding requests and replies<\/li>\n\n\n\n<li>Subnetting and converting IP addresses to and from binary<\/li>\n\n\n\n<li>Understanding the basic operation of RSA<\/li>\n\n\n\n<li>Using the NVD and understanding the information it provides<\/li>\n\n\n\n<li>Evaluating a case study and mapping its aspects to the Cyber Kill Chain<\/li>\n\n\n\n<li>Examining SQL commands and how they can be used to perform SQL injection<\/li>\n<\/ul>\n\n\n\n<p>Near the end of the semester, I had to apply the knowledge learned throughout this course by writing a technical analysis of a recent cyberattack<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Cyberattack Analysis:<\/h3>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/abcyber\/wp-content\/uploads\/sites\/35141\/2024\/12\/annotated-CS-462-Blog-Post.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">annotated-CS-462-Blog-Post<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity Fundamentals Introduction to networking and the Internet protocol stack; Vulnerable protocols such as HTTP, DNS, and BGP; Overview of wireless communications, vulnerabilities, and security protocols; Introduction to cryptography; Discussion of cyber threats and defenses; Firewalls and IDS\/IPS; Kerberos; Transport Layer Security, including certificates; Network Layer Security. The following are the course objectives follows: Course&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/abcyber\/cs-462\/\">Read More<\/a><\/div>\n","protected":false},"author":26635,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/pages\/417"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/users\/26635"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/comments?post=417"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/pages\/417\/revisions"}],"predecessor-version":[{"id":425,"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/pages\/417\/revisions\/425"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/abcyber\/wp-json\/wp\/v2\/media?parent=417"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}