Cybersecurity Fundamentals: CS 462

Course Overview

Introduction to networking and the Internet protocol stack; Vulnerable protocols such as HTTP, DNS, and BGP; Overview of wireless communications, vulnerabilities, and security protocols; Introduction to cryptography; Discussion of cyber threats and defenses; Firewalls and IDS/IPS; Kerberos; Transport Layer Security, including certificates; Network Layer Security.

This is the first course in the Graduate Certificate Program in Cybersecurity. This course will introduce the networking and cybersecurity background that you’ll need to succeed in the other courses in the certificate program.

Cybersecurity emphasizes prevention of attacks that are perpetrated using the Internet. It includes application security, information security, and network security. Because the foundations of cybersecurity rely so heavily on knowledge of networking, this course will cover networking background before discussing details of cybersecurity.

Course Work

Assignment 1

The objective of this project is to describe and explain a recent cybersecurity attack in at least 1,500 words, including details on the technologies used to perpetrate the attack. It is important to note that this work does not require it to be in any specific format, but the hyperlinks used should work correctly.

The focus of this blog should be on how the vulnerability, breach, or attack works, including the devices, protocols, or applications that can be attacked. Additionally, you should describe how the topic affects today’s society. It is essential to use your own words and avoid copying any references found online. All sources must be cited correctly.

CS 462 Term Project

Assignment 2

Instructions: Watch this video,

https://www.ted.com/talks/danny_hillis_the_internet_could_crash_we_need_a_plan_b/transcript?language=en#t-265890Links to an external site.

This was a TED talk by Danny Hills. Topic was “The internet could crash. We need a Plan B” According to him, “From each according to their ability to each according to their need” was the concept about IP in the olden days.Discuss how it has changed in the present, preferably giving examples like he has talked about (Router bug causing flight to ground). Also feel free to comment on the favorite parts from the video.

Discussion Board