CYSE 301

Cybersecurity Techniques and Operations

This course introduces tools and techniques used to secure and analyze large computer networks and systems. Students will systematically learn C programming in the first part of the course, which forms a foundation for many cybersecurity operations, such as malware analysis, understanding network protocol stack, etc. In the second part, students will explore and map networks using a variety of diagnostic software tools, learn advanced packet analysis, configure firewalls, write intrusion detection rules, perform forensic investigation, and practice techniques for penetration testing. The objectives are:

  • Understand the concepts and major constructs of the C programming language,
  • Master the programming skills of the C programming language,
  • Be able to analyze the C source code to infer the functionality of a given code segment, C function, C program etc,
  • Grasp the needed techniques and skills to write a C program in cybersecurity operations such as a network protocol stack,
  • Monitor and analyze network traffic. Identify and trace the traffic when intrusion is detected in the network,
  • Identify and evaluate the vulnerabilities in the network and implement effective countermeasures to protect the network,
  • Master the technologies to exploit the vulnerabilities in a remote system,
  • Analyze the vulnerabilities in wireless communication network,
  • Manage data and personal information in a secure manner.

Course Material

The hands-on labs are as follows:

Module #1 Basic Linux commands

module #2 Traffic tracing and Sniffing

CLICK BELOW TO ACCESS MODULE 2 ASSIGNMENT:

https://docs.google.com/document/d/1DfaicJSELIiGylAdI-mCMupsXv6gJ_d9vg3oUg9tMi4/edit?usp=drive_link

module #3 Sword and shield

CLICK BELOW TO ACCESS MODULE 3 ASSIGNMENT:

https://docs.google.com/document/d/11jPEW7Lpx2VNxgT29qnzyO7RZyzn2TkvWQPbcPb6iPo/edit?usp=drive_link

module #4 Ethical Hacking

CLICK BELOW TO ACCESS MODULE 4 ASSIGNMENT:

https://docs.google.com/document/d/1tRtPE7zKrF_9dqFYV0-8lCRGzNmTx4m9arU5gnwbNBQ/edit?usp=drive_link

module #5 Password cracking in Linux and windows

CLICK BELOW TO ACCESS MODULE 5 ASSIGNMENT:

https://docs.google.com/document/d/1fl9qK9o9mcXFL86VK68tIpLCg2H43d0wmBWB6H4EEG0/edit?usp=drive_link

module #6 Hide your secret!

CLICK BELOW TO ACCESS MODULE 6 ASSIGNMENT:

https://docs.google.com/document/d/15EjpDtv-Nhh3qx7JoShW7IbtMNojfYTjKJulZtN0GK0/edit?usp=drive_link

Reflection

While taking this course I was able to deepen my understanding of Linux and develop many new skills that will help me later in my career. Much of these new skills are rooted in the various different tools I’ve learned to use within Linux and windows such as Metasploit, Wireshark, jack the ripper, and many more. As a result I think that this class has had the biggest influence on me so far in my journey to deepen my knowledge of everything cybersecurity.