CYSE 300 – Introduction to Cybersecurity

Course Overview

Old Dominion University’s CYSE 300: Introduction to Cybersecurity provides a foundational understanding of cybersecurity principles, technologies, and practices used to protect information systems. The course introduces the fundamental concepts necessary to understand how organizations defend digital assets against cyber threats.

Throughout the course, I explored topics such as computer system architecture, network security, cryptography, risk management, and cyber threat analysis. The course emphasized both theoretical knowledge and practical application through laboratory exercises that simulated real-world cybersecurity scenarios.

By completing this course, I developed an understanding of how organizations identify critical information assets, analyze vulnerabilities, implement security strategies, and respond to cybersecurity incidents.


Learning Outcomes and Skills Developed

Through this course, I worked toward several key cybersecurity competencies.

Identifying and Prioritizing Information Assets

One of the first concepts emphasized in CYSE 300 was understanding the value of information assets. I learned how organizations classify and prioritize data based on sensitivity, importance, and risk exposure. This process is essential for determining which assets require the strongest security protections.

Identifying and Prioritizing Threats

I analyzed common cyber threats such as malware, phishing attacks, unauthorized access attempts, and network vulnerabilities. Through lab activities and case studies, I practiced identifying potential threats and evaluating the risks they pose to critical infrastructure and organizational systems.

Information Security Strategy and Architecture

Another major focus of the course was designing security strategies that integrate multiple protective measures. I learned about layered security architectures that combine network defenses, access controls, monitoring tools, and encryption to reduce risk.

Incident Response and Intrusion Handling

Cybersecurity professionals must be prepared to detect and respond to attacks quickly. In this course, I explored how security teams identify suspicious activity, analyze system logs, and respond to intrusions in order to minimize damage and restore system functionality.

Legal and Ethical Considerations

Security and privacy issues often have legal and ethical implications. I studied how cybersecurity policies must comply with laws and regulations while also protecting user privacy and maintaining organizational trust.

Disaster Recovery and Business Continuity

Organizations must plan for recovery after cybersecurity incidents or system failures. I learned how disaster recovery plans and business continuity strategies ensure that critical services remain operational and data can be restored after an attack or outage.


Cybersecurity Laboratory Experience

CYSE 300 included ten hands-on laboratory exercises designed to reinforce the course concepts and provide practical cybersecurity experience. These labs allowed me to apply theoretical knowledge in simulated environments using industry tools and techniques.

Reconnaissance and Network Probing

In this lab, I used common reconnaissance tools to gather information about network systems and identify potential vulnerabilities. This activity demonstrated how attackers collect intelligence before launching cyber attacks and highlighted the importance of limiting exposed system information.

Vulnerability Assessment

I conducted a vulnerability scan to detect weaknesses in system configurations and software versions. This exercise helped me understand how security professionals proactively identify and mitigate vulnerabilities before they can be exploited.

Active Directory and Access Control

This lab focused on configuring Windows Active Directory to manage users and enforce access control policies. I learned how proper identity management helps organizations restrict unauthorized access to sensitive systems.

Security Baselines and Group Policy

Using security configuration tools, I implemented system policies to enforce security standards and monitor compliance. This demonstrated how organizations maintain consistent security configurations across large networks.

Packet Capture and Network Analysis

In this exercise, I used packet capture tools to analyze network traffic. This lab provided insight into how network administrators detect suspicious communication patterns and investigate potential security incidents.

Encryption and Data Protection

I implemented encryption techniques to enhance data confidentiality and integrity. This lab showed how cryptographic tools protect sensitive information from unauthorized access or tampering.

Website and Database Vulnerability Testing

This lab simulated a web application attack by exploiting known vulnerabilities. The exercise demonstrated how insecure coding practices can create serious security risks.

Layered Security Implementation

I explored the concept of defense in depth, where multiple security controls work together to protect systems from threats. This approach helps prevent attackers from compromising an entire system if one layer fails.

Information Systems Security Policy

Finally, I developed a security policy outlining rules and procedures for protecting organizational information systems. This lab emphasized the importance of governance, documentation, and clear security guidelines.


Application to My Future Career

The knowledge and skills gained in CYSE 300 provide a strong foundation for further study and professional development in cybersecurity. Understanding threat analysis, network security, risk management, and incident response is essential for protecting modern information systems.

As I continue my studies in cybersecurity at Old Dominion University, I will build upon these concepts in more advanced courses involving penetration testing, secure system design, and digital forensics.

These skills will prepare me to contribute to organizations by helping them secure critical infrastructure, protect sensitive information, and respond effectively to cyber threats.

My Work:

These are two research papers I wrote at the beginning of the semester. Upon reflection, I think they did a good job of setting the tone for the class.

Specialized-Security-Policy-1

Research-of-Facebook-Data-Breach-1-1