CYSE 301 – Cyber Techniques and Operations

Cybersecurity Techniques and Operations

This course introduces tools and techniques used to secure and analyze large computer networks and systems. Students work with a foundation for many cybersecurity operations, such as malware analysis, understanding network protocol stack.  It also explores and maps networks using a variety of diagnostic software tools.  It also includes:  advanced packet analysis, configure firewalls, intrusion detection rules, performing forensic investigation, and practicing the techniques for pen testing using Kali Linux. The objectives are:

  • Understand the concepts and major constructs of the programming language and master those skills.
  • The ability to analyze source code that infers functionality of a given code segment.
  • Students grasp necessary techniques and skills to write cybersecurity operations such as a network protocol stack.
  • Skills to monitor/analyze the network traffic such as using WireShark and identification/tracing of that traffic when intrusions are identified.
  • Identify/evaluate network vulnerabilities, then implement effective countermeasures as protection.
  • Master technologies used in exploits on the vulnerabilities in remote systems.
  • Vulnerability analysis in wireless (Wi-Fi) communication networks,
  • Practice secure data management skills and secure personal information.

Course Materials

There are both programming assignments and hands-on labs using Palo Alto Networks for cybersecurity operations. The hands-on labs are as follows:

  1. Traffic tracing through Wireshark and TCPdump
  2. Firewall configuration with pfSense
  3. Penetration test on Windows – remote access vulnerability – Kali Linux
  4. Password cracking – Jack the Ripper
  5. WiFi password cracking
  6. Information hiding – Digital Steganog