Course provides an overview of theory, tools and practice of cyber security and information assurance
through prevention, detection and modeling of cyber attacks and recovery from such attacks. Techniques
for security modeling, attack modeling, risk analysis and cost-benefit analysis are described to manage the security of cyber systems. Fundamental principles of cyber security and their applications for protecting software and information assets of individual computers and large networked systems are explored. Anatomy of some sample attacks designed to compromise confidentiality, integrity and availability of cyber systems discussed.
What I learned
I was learning a lot about commands that could take advantage of certain programs to gain root access of a computer. This is very dangerous and can cause lots of damage due to the root access. It is important that we would try this in a proper lab environment that would not harm any organization. We will also learn how to write our own malware at the end of the semester.
Example Assignment: Lab 4 String Format Exploit
http://sites.wp.odu.edu/cpd494portfolio/wp-content/uploads/sites/32488/2023/12/Lab4-MSIM-470-.pdf
The significance of MSIM 470 was to eventually be able to write our own malware. This will help by improving my code skills in the most ethical way possible. This connects to the overall message of my portfolio by helping me be straightforward with my work and also provide some explanation so that the professor could easily follow along.