CS 462

Cybersecurity Fundamentals

Introduction to networking and the Internet protocol stack; Vulnerable protocols such as HTTP, DNS, and BGP; Overview of wireless communications, vulnerabilities, and security protocols; Introduction to cryptography; Discussion of cyber threats and defenses; Firewalls and IDS/IPS; Kerberos; Transport Layer Security, including certificates; Network Layer Security.

After completing this course, students should have a strong foundation in the principles of the Internet architecture, an awareness of vulnerabilities in the Internet protocol stack, and an introduction to issues in cybersecurity.

Upon successful completion of this course, students will:

  • Gain experience with the online course system.
  • Explain the general architecture of the Internet, including the main functions of end systems androuters.
  • Describe the basic client-server architecture and how typical network applications (web, email) fit intothe architecture.
  • Explain how web pages are requested and delivered using HTTP.
  • Explain in general how DNS enables our use of the Internet and, in particular, how hosts determinethe IP address of network servers.
  • Explain how MAC addresses are used and assigned to a packet as it traverses a network.
  • Differentiate between wireless LANs and wired LANs.
  • Explain how IP CIDR addressing is performed and how an IP address is assigned from a group ofavailable addresses.
  • Explain the core functions of TCP including details of connection setup.
  • Analyze and differentiate among types of malware and attacks.
  • Analyze and differentiate among types of wireless attacks and application attacks.
  • Identify vulnerabilities potentially present in DNS, databases, and web applications.
  • Summarize general cryptography concepts.
  • Describe how certificates can be used for authentication and encryption.
  • Explain how firewalls and VPNs can be used to protect a network.

As one of our culminating assignments, we were required to describe and explain a recent cybersecurity attack, including details on the technologies used to perpetrate the attack. Below is that assignment describing the NotPetya Malware Attack:

Antonio-Shields-CS-462-Blog-Term-Project-NotPetya-Malware-Attack