Cybersecurity Techniques and Operations
This course introduces tools and techniques used to secure and analyze large computer networks and systems. Students work with a foundation for many cybersecurity operations, such as malware analysis, understanding network protocol stack. It also explores and maps networks using a variety of diagnostic software tools. It also includes: advanced packet analysis, configure firewalls, intrusion detection rules, performing forensic investigation, and practicing the techniques for pen testing using Kali Linux. The objectives are:
- Understand the concepts and major constructs of the programming language and master those skills.
- The ability to analyze source code that infers functionality of a given code segment.
- Students grasp necessary techniques and skills to write cybersecurity operations such as a network protocol stack.
- Skills to monitor/analyze the network traffic such as using WireShark and identification/tracing of that traffic when intrusions are identified.
- Identify/evaluate network vulnerabilities, then implement effective countermeasures as protection.
- Master technologies used in exploits on the vulnerabilities in remote systems.
- Vulnerability analysis in wireless (Wi-Fi) communication networks,
- Practice secure data management skills and secure personal information.
Course Materials
There are both programming assignments and hands-on labs using Palo Alto Networks for cybersecurity operations. The hands-on labs are as follows:
- Traffic tracing through Wireshark and TCPdump
- Firewall configuration with pfSense
- Penetration test on Windows – remote access vulnerability – Kali Linux
- Password cracking – Jack the Ripper
- WiFi password cracking
- Information hiding – Digital Steganog