{"id":141,"date":"2022-01-25T16:30:54","date_gmt":"2022-01-25T16:30:54","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=141"},"modified":"2025-04-22T15:06:13","modified_gmt":"2025-04-22T15:06:13","slug":"cyse-300","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/gridg02\/cyse-300\/","title":{"rendered":"CYSE 300"},"content":{"rendered":"<h1 class=\"p1\" style=\"text-align: center\">Introduction to Cybersecurity<\/h1>\n<p>This course provides an overview of the field of cybersecurity. It covers core cybersecurity topics including computer system architectures, critical infrastructures, cyber threats and vulnerabilities, cryptography, information assurance, network security, and risk assessment and management. Students are expected to become familiar with fundamental security concepts, technologies, and practices. This course provides a foundation for further study in cybersecurity.<\/p>\n<p>The course objectives are:<\/p>\n<ul>\n<li>Identify and prioritize information assets;<\/li>\n<li>Identify and prioritize threats to information assets;<\/li>\n<li>Define an information security strategy and architecture;<\/li>\n<li>Plan for and respond to intruders in an information system;<\/li>\n<li>Describe legal and public relations implications of security and privacy issues; and<\/li>\n<li>Present a disaster recovery plan for recovery of information assets after an incident.<\/li>\n<\/ul>\n<h3 class=\"\" data-start=\"227\" data-end=\"270\"><\/h3>\n<p class=\"\" data-start=\"271\" data-end=\"324\"><em data-start=\"301\" data-end=\"324\">Completed Spring 2023<\/em><\/p>\n<p class=\"\" data-start=\"326\" data-end=\"597\">This course provided a hands-on introduction to core cybersecurity principles, tools, and practices. Throughout the semester, I engaged in theoretical learning and practical lab-based exercises designed to build foundational knowledge and applied skills in cybersecurity.<\/p>\n<p class=\"\" data-start=\"599\" data-end=\"636\"><strong data-start=\"599\" data-end=\"636\">Key Accomplishments &amp; Activities:<\/strong><\/p>\n<ul data-start=\"638\" data-end=\"1819\">\n<li class=\"\" data-start=\"638\" data-end=\"1130\">\n<p class=\"\" data-start=\"640\" data-end=\"731\"><strong data-start=\"640\" data-end=\"667\">Hands-on Lab Experience<\/strong>: Completed 15 labs that covered a wide range of topics such as:<\/p>\n<ul data-start=\"734\" data-end=\"1130\">\n<li class=\"\" data-start=\"734\" data-end=\"765\">\n<p class=\"\" data-start=\"736\" data-end=\"765\">Remote and local exploitation<\/p>\n<\/li>\n<li class=\"\" data-start=\"768\" data-end=\"791\">\n<p class=\"\" data-start=\"770\" data-end=\"791\">SQL injection attacks<\/p>\n<\/li>\n<li class=\"\" data-start=\"794\" data-end=\"832\">\n<p class=\"\" data-start=\"796\" data-end=\"832\">Denial-of-service (DoS) from the WAN<\/p>\n<\/li>\n<li class=\"\" data-start=\"835\" data-end=\"864\">\n<p class=\"\" data-start=\"837\" data-end=\"864\">Securing a pfSense firewall<\/p>\n<\/li>\n<li class=\"\" data-start=\"867\" data-end=\"918\">\n<p class=\"\" data-start=\"869\" data-end=\"918\">Active Directory usage in enterprise environments<\/p>\n<\/li>\n<li class=\"\" data-start=\"921\" data-end=\"962\">\n<p class=\"\" data-start=\"923\" data-end=\"962\">Capturing and analyzing network traffic<\/p>\n<\/li>\n<li class=\"\" data-start=\"965\" data-end=\"1021\">\n<p class=\"\" data-start=\"967\" data-end=\"1021\">Wireless network exploitation and decryption (WEP\/WPA)<\/p>\n<\/li>\n<li class=\"\" data-start=\"1024\" data-end=\"1079\">\n<p class=\"\" data-start=\"1026\" data-end=\"1079\">Browser exploitation via Remote Access Trojans (RATs)<\/p>\n<\/li>\n<li class=\"\" data-start=\"1082\" data-end=\"1130\">\n<p class=\"\" data-start=\"1084\" data-end=\"1130\">Data backups and malware deployment techniques<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"\" data-start=\"1132\" data-end=\"1447\">\n<p class=\"\" data-start=\"1134\" data-end=\"1258\"><strong data-start=\"1134\" data-end=\"1161\">Quizzes and Discussions<\/strong>: Participated in weekly quizzes and discussion forums to reinforce understanding of topics like:<\/p>\n<ul data-start=\"1261\" data-end=\"1447\">\n<li class=\"\" data-start=\"1261\" data-end=\"1300\">\n<p class=\"\" data-start=\"1263\" data-end=\"1300\">Risk management and threat modeling<\/p>\n<\/li>\n<li class=\"\" data-start=\"1303\" data-end=\"1350\">\n<p class=\"\" data-start=\"1305\" data-end=\"1350\">Network and web application vulnerabilities<\/p>\n<\/li>\n<li class=\"\" data-start=\"1353\" data-end=\"1400\">\n<p class=\"\" data-start=\"1355\" data-end=\"1400\">Security controls and mitigation strategies<\/p>\n<\/li>\n<li class=\"\" data-start=\"1403\" data-end=\"1447\">\n<p class=\"\" data-start=\"1405\" data-end=\"1447\">Legal and ethical aspects of cybersecurity<\/p>\n<\/li>\n<\/ul>\n<\/li>\n<li class=\"\" data-start=\"1449\" data-end=\"1642\">\n<p class=\"\" data-start=\"1451\" data-end=\"1642\"><strong data-start=\"1451\" data-end=\"1471\">Research Writing<\/strong>: Authored two short research papers on emerging cybersecurity topics, demonstrating the ability to evaluate threats and convey technical concepts clearly and effectively.<\/p>\n<\/li>\n<li class=\"\" data-start=\"1644\" data-end=\"1819\">\n<p class=\"\" data-start=\"1646\" data-end=\"1819\"><strong data-start=\"1646\" data-end=\"1668\">Tools &amp; Techniques<\/strong>: Gained exposure to key cybersecurity tools and methodologies used for penetration testing, network scanning, system hardening, and incident response.<\/p>\n<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Introduction to Cybersecurity This course provides an overview of the field of cybersecurity. It covers core cybersecurity topics including computer system architectures, critical infrastructures, cyber threats and vulnerabilities, cryptography, information assurance, network security, and risk assessment and management. Students are expected to become familiar with fundamental security concepts, technologies, and practices. This course provides a&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/gridg02\/cyse-300\/\">Read More<\/a><\/div>\n","protected":false},"author":23330,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/pages\/141"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/users\/23330"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":3,"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/pages\/141\/revisions"}],"predecessor-version":[{"id":426,"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/pages\/141\/revisions\/426"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/gridg02\/wp-json\/wp\/v2\/media?parent=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}