Introduction to Cybersecurity
This course provides an overview of the field of cybersecurity. It covers core cybersecurity topics including computer system architectures, critical infrastructures, cyber threats and vulnerabilities, cryptography, information assurance, network security, and risk assessment and management. Students are expected to become familiar with fundamental security concepts, technologies, and practices. This course provides a foundation for further study in cybersecurity.
The course objectives are:
- Identify and prioritize information assets;
- Identify and prioritize threats to information assets;
- Define an information security strategy and architecture;
- Plan for and respond to intruders in an information system;
- Describe legal and public relations implications of security and privacy issues; and
- Present a disaster recovery plan for recovery of information assets after an incident.
Course Material
The course contains fifteen cybersecurity laboratory assignments and two research paper.
The cybersecurity laboratories I have done in this class include the following:
- Introduction to File Systems;
- Securing the pfSenese Firewall;
- Implementing NAT and Allowing Remote Access;
- Implementing Common Protocols and Services;
- Examining Wireless Networks;
- Implementing Security Policies on Windows and Linux;
- Data Backups in Windows, BSD, and Linux;
- Incident Response Procedures, Forensics, and Forensic Analysis;
- Configuring a Windows Based Firewall to Allow Incoming Traffic;
- Intrusion Detection using Snort;
- Deep Dive in Packet Analysis-Using Wireshark and Network Miner;
- Log Analysis;
- Patching, Securing Systems, and Configuring Anti-Virus;
- Using Active Directory in the Enterprise; and
- Closing Security Holes.
These are the two Research Paper I have done in this course.