Cybersecurity Techniques and Operations
This course introduces tools and techniques used to secure and analyze large computer networks and systems. Students will systematically learn C programming in the first part of the course, which forms a foundation for many cybersecurity operations, such as malware analysis, understanding network protocol stack, etc. In the second part, students will explore and map networks using a variety of diagnostic software tools, learn advanced packet analysis, configure firewalls, write intrusion detection rules, perform forensic investigation, and practice techniques for penetration testing. The objectives are:
• Understand the rules and laws involved in real-world cyber operations,
• Understand the basic components of the model computing networks, and take different
techniques to identify and trace the network traffic if an instruction is detected inside a
network,
• Identify and evaluate the vulnerabilities in the network and implement effective
countermeasures to protect the network from possible attacks,
• Understand how to plan, organize and perform penetration testing on a network,
• Understand different cryptographic protocols, tools, and mechanisms used for different
systems, and exploit their weaknesses accordingly,
• Manage data and personal information in a secure manner
Course Material