CYSE 301

Cybersecurity Techniques and Operations

This course introduces tools and techniques used to secure and analyze large computer networks and systems. I systematically learn C programming in the first part of the course, which forms a foundation for many cybersecurity operations, such as malware analysis, understanding network protocol stack, etc. In the second part, I explored and mapped networks using a variety of diagnostic software tools, learn advanced packet analysis, configure firewalls, write intrusion detection rules, perform forensic investigation, and practice techniques for penetration testing. The objectives are:

  • Understand the concepts and major constructs of the C programming language,
  • Master the programming skills of the C programming language,
  • Be able to analyze the C source code to infer the functionality of a given code segment, C function, C program etc,
  • Grasp the needed techniques and skills to write a C program in cybersecurity operations such as a network protocol stack,
  • Monitor and analyze network traffic. Identify and trace the traffic when intrusion is detected in the network,
  • Identify and evaluate the vulnerabilities in the network and implement effective countermeasures to protect the network,
  • Master the technologies to exploit the vulnerabilities in a remote system,
  • Analyze the vulnerabilities in a wireless communication network,
  • Manage data and personal information in a secure manner.

Course Material

There are both programming assignments for C programming and hands-on labs for cybersecurity and operations. This is an assignment for my Cybersecurity Techniques and Operations class. It is a traffictracing and analysis lab. In this lab, I used Ubuntu, DNS, and Wireshark to ping an IP addressand find passwords and usernames. It is important because it shows my knowledge about Ubuntuand what I have learned about it. Personalization Principle (1).pdf