CYSE 300

Introduction to Cybersecurity

Course Material

Throughout this course, I engaged in a comprehensive set of cybersecurity laboratory assignments and research projects that collectively strengthened my understanding of core security principles, technical tools, and real-world applications. The combination of hands-on labs and analytical writing allowed me to develop both practical skills and conceptual knowledge aligned with industry expectations.

My work in this course reflects a strong working knowledge of cybersecurity concepts including threat analysis, system hardening, access control, network monitoring, and policy development. Each laboratory assignment required me to actively apply these concepts in simulated environments, reinforcing both technical proficiency and critical thinking.

In my paper on the Capital One data breach, I analyzed how a misconfigured web application firewall and improper access controls led to the exposure of over 100 million records. This case study reinforced the importance of secure configuration, monitoring, and least privilege—concepts I actively applied in labs such as vulnerability assessment and access control configuration.

Short-Research-Paper-1-Celeste-Meraz-Luna

In my second research paper, I explored five key issues in information systems security policy, including access control, data classification, network security, physical security, and incident response. This directly aligns with several labs, particularly those focused on encryption, layered defense, and business continuity planning. Writing this paper strengthened my ability to think strategically about security from an organizational perspective, beyond just technical implementation.

Short-Research-Paper-2-Celeste-Meraz-Luna

The knowledge and skills I developed in this course are directly applicable to my future career in cybersecurity. I have gained practical experience in areas such as threat detection, system configuration, risk assessment, and policy development—skills that are essential for roles such as security analyst, system administrator, or cybersecurity consultant.

Moving forward, I will apply these competencies to help organizations design secure systems, identify vulnerabilities, and implement effective security policies. The combination of hands-on technical experience and research-based understanding positions me to contribute to both operational security and strategic decision-making within the cybersecurity field.