Cybersecurity Techniques and Operations
This course introduces tools and techniques used to secure and analyze large computer networks and systems. I systematically learn C programming in the first part of the course, which forms a foundation for many cybersecurity operations, such as malware analysis, understanding network protocol stack, etc. In the second part, I explored and mapped networks using a variety of diagnostic software tools, learn advanced packet analysis, configure firewalls, write intrusion detection rules, perform forensic investigation, and practice techniques for penetration testing. The objectives are:
- Understand the concepts and major constructs of the C programming language,
- Master the programming skills of the C programming language,
- Be able to analyze the C source code to infer the functionality of a given code segment, C function, C program etc,
- Grasp the needed techniques and skills to write a C program in cybersecurity operations such as a network protocol stack,
- Monitor and analyze network traffic. Identify and trace the traffic when intrusion is detected in the network,
- Identify and evaluate the vulnerabilities in the network and implement effective countermeasures to protect the network,
- Master the technologies to exploit the vulnerabilities in a remote system,
- Analyze the vulnerabilities in a wireless communication network,
- Manage data and personal information in a secure manner.
Course Material
There are both programming assignments for C programming and hands-on labs for cybersecurity and operations. This is an assignment for my Cybersecurity Techniques and Operations class. It is a traffic
tracing and analysis lab. In this lab, I used Ubuntu, DNS, and Wireshark to ping an IP address
and find passwords and usernames. It is important because it shows my knowledge about Ubuntu
and what I have learned about it. Personalization Principle (1).pdf