CS 462

Cybersecurity Fundamentals

Introduction to networking and the Internet protocol stack; Vulnerable protocols such as HTTP, DNS, and BGP; Overview of wireless communications, vulnerabilities, and security protocols; Introduction to cryptography; Discussion of cyber threats and defenses; Firewalls and IDS/IPS; Kerberos; Transport Layer Security, including certificates; Network Layer Security.

Upon successful completion of this course, students will:

  • Gain experience with the online course system.
  • Explain the general architecture of the Internet, including the main functions of end systems and routers.
  • Describe the basic client-server architecture and how typical network applications (web, email) fit into the architecture.
  • Explain how web pages are requested and delivered using HTTP.
  • Explain in general how DNS enables our use of the Internet and, in particular, how hosts determine the IP address of network servers.
  • Explain how MAC addresses are used and assigned to a packet as it traverses a network.
  • Differentiate between wireless LANs and wired LANs.
  • Explain how IP CIDR addressing is performed and how an IP address is assigned from a group of available addresses.
  • Explain the core functions of TCP including details of connection setup.
  • Analyze and differentiate among types of malware and attacks.
  • Analyze and differentiate among types of wireless attacks and application attacks.
  • Identify vulnerabilities potentially present in DNS, databases, and web applications.
  • Summarize general cryptography concepts.
  • Describe how certificates can be used for authentication and encryption.
  • Explain how firewalls and VPNs can be used to protect a network.

Course Material

This course gave me an overview of cybersecurity as a whole. It went over application security, information security, and network security. This course gave me a strong foundation in the principles of the internet architecture, an awareness of vulnerabilities in the Internet protocol stack, and ethical issues in cybersecurity.