{"id":141,"date":"2025-01-16T15:58:08","date_gmt":"2025-01-16T15:58:08","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=141"},"modified":"2026-05-03T20:47:44","modified_gmt":"2026-05-03T20:47:44","slug":"cyse-300","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/cyse-300\/","title":{"rendered":"CYSE 300"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Introduction to Cybersecurity<\/h1>\n<p>This course allows students to examine a broad range of computer security issues and provides the student with technical knowledge not normally addressed in traditional training. It explores the protection of proprietary information and security planning with an emphasis on networked computer vulnerabilities. It also focuses on detection (e.g. viruses, hackers, types of computer crime, computer forensic examination, etc.), as well as disaster recovery and technology law. Emphasis is placed on the security of systems and computer crime prevention. Also addressed is the maturing criminal population with increased computer literacy, whose tendency is to move from violent actions to more profitable computer crime. Finally, issues of privacy and freedom of information are examined.<\/p>\n<p>The course objectives are:<\/p>\n<ul>\n<li>Identify and prioritize information assets;<\/li>\n<li>Identify and prioritize threats to information assets;<\/li>\n<li>Define an information security strategy and architecture;<\/li>\n<li>Plan for and respond to intruders in an information system;<\/li>\n<li>Describe legal and public relations implications of security and privacy issues; and<\/li>\n<li>Present a disaster recovery plan for recovery of information assets after an incident.<\/li>\n<\/ul>\n<h1>Course Material<\/h1>\n<p class=\"p1\">Throughout this course, I engaged in a comprehensive set of cybersecurity laboratory assignments and research projects that collectively strengthened my understanding of core security principles, technical tools, and real-world applications. The combination of hands-on labs and analytical writing allowed me to develop both practical skills and conceptual knowledge aligned with industry expectations.<\/p>\n<p class=\"p1\">My work in this course reflects a strong working knowledge of cybersecurity concepts including threat analysis, system hardening, access control, network monitoring, and policy development. Each laboratory assignment required me to actively apply these concepts in simulated environments, reinforcing both technical proficiency and critical thinking.<\/p>\n<p class=\"p1\">In my paper on the <span class=\"s2\">Capital One data breach<\/span><span class=\"s1\">, I analyzed how a misconfigured web application firewall and improper access controls led to the exposure of over 100 million records. This case study reinforced the importance of secure configuration, monitoring, and least privilege\u2014concepts I actively applied in labs such as vulnerability assessment and access control configuration.<\/span><\/p>\n\n<a href=\"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2026\/05\/Short-Research-Paper-1-Celeste-Meraz-Luna.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Short-Research-Paper-1-Celeste-Meraz-Luna<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>In my second research paper, I explored five key issues in information systems security policy, including access control, data classification, network security, physical security, and incident response. This directly aligns with several labs, particularly those focused on encryption, layered defense, and business continuity planning. Writing this paper strengthened my ability to think strategically about security from an organizational perspective, beyond just technical implementation.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-content\/uploads\/sites\/38077\/2026\/05\/Short-Research-Paper-2-Celeste-Meraz-Luna.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Short-Research-Paper-2-Celeste-Meraz-Luna<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>The knowledge and skills I developed in this course are directly applicable to my future career in cybersecurity. I have gained practical experience in areas such as threat detection, system configuration, risk assessment, and policy development\u2014skills that are essential for roles such as security analyst, system administrator, or cybersecurity consultant.<\/p>\n\n\n\n<p>Moving forward, I will apply these competencies to help organizations design secure systems, identify vulnerabilities, and implement effective security policies. The combination of hands-on technical experience and research-based understanding positions me to contribute to both operational security and strategic decision-making within the cybersecurity field.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction to Cybersecurity This course allows students to examine a broad range of computer security issues and provides the student with technical knowledge not normally addressed in traditional training. It explores the protection of proprietary information and security planning with an emphasis on networked computer vulnerabilities. It also focuses on detection (e.g. viruses, hackers, types&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/celestemerazluna\/cyse-300\/\">Read More<\/a><\/div>\n","protected":false},"author":30333,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/pages\/141"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/users\/30333"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/pages\/141\/revisions"}],"predecessor-version":[{"id":414,"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/pages\/141\/revisions\/414"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/celestemerazluna\/wp-json\/wp\/v2\/media?parent=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}