Introduction to Cybersecurity
This course provides an overview of the field of cybersecurity. It covers core cybersecurity topics including computer system architectures, critical infrastructures, cyber threats and vulnerabilities, cryptography, information assurance, network security, and risk assessment and management. Students are expected to become familiar with fundamental security concepts, technologies, and practices. This course provides a foundation for further study in cybersecurity.
The course objectives are:
- Identify and prioritize information assets;
- Identify and prioritize threats to information assets;
- Define an information security strategy and architecture;
- Plan for and respond to intruders in an information system;
- Describe legal and public relations implications of security and privacy issues; and
- Present a disaster recovery plan for recovery of information assets after an incident.
Completed Spring 2023
This course provided a hands-on introduction to core cybersecurity principles, tools, and practices. Throughout the semester, I engaged in theoretical learning and practical lab-based exercises designed to build foundational knowledge and applied skills in cybersecurity.
Key Accomplishments & Activities:
-
Hands-on Lab Experience: Completed 15 labs that covered a wide range of topics such as:
-
Remote and local exploitation
-
SQL injection attacks
-
Denial-of-service (DoS) from the WAN
-
Securing a pfSense firewall
-
Active Directory usage in enterprise environments
-
Capturing and analyzing network traffic
-
Wireless network exploitation and decryption (WEP/WPA)
-
Browser exploitation via Remote Access Trojans (RATs)
-
Data backups and malware deployment techniques
-
-
Quizzes and Discussions: Participated in weekly quizzes and discussion forums to reinforce understanding of topics like:
-
Risk management and threat modeling
-
Network and web application vulnerabilities
-
Security controls and mitigation strategies
-
Legal and ethical aspects of cybersecurity
-
-
Research Writing: Authored two short research papers on emerging cybersecurity topics, demonstrating the ability to evaluate threats and convey technical concepts clearly and effectively.
-
Tools & Techniques: Gained exposure to key cybersecurity tools and methodologies used for penetration testing, network scanning, system hardening, and incident response.