{"id":360,"date":"2026-04-18T00:27:42","date_gmt":"2026-04-18T00:27:42","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/?page_id=360"},"modified":"2026-04-18T01:28:13","modified_gmt":"2026-04-18T01:28:13","slug":"cs-462-cybersecurity-fundamentals","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/cs-462-cybersecurity-fundamentals\/","title":{"rendered":"CS 462 &#8211; Cybersecurity Fundamentals"},"content":{"rendered":"\n<p>CS 462 serves as an introduction to networking and the Internet protocol stack. Then, the course covers cybersecurity topics using the Internet protocol stack as a foundation to understand those topics. Topics covered include an Introduction to networking and the Internet protocol stack; Vulnerable protocols such as HTTP, DNS, and BGP; Overview of wireless communications, vulnerabilities, and security protocols; Introduction to cryptography; Discussion of cyber threats and defenses; Firewalls and IDS\/IPS; Kerberos; Transport Layer Security, including certificates; Network Layer Security.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Course Materials<\/strong><\/h2>\n\n\n\n<p>Here is a paper that focused on describing a cybersecurity attack that was recent at the time with a focus on how the attack works and how it affected society at the time.<\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/Blog2.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"off\">Blog2<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p>Here is a screenshot showcasing the traceroute command<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"532\" src=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/Screenshot-2024-01-28-184116-1024x532.png\" alt=\"\" class=\"wp-image-375\" srcset=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/Screenshot-2024-01-28-184116-1024x532.png 1024w, https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/Screenshot-2024-01-28-184116-300x156.png 300w, https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/Screenshot-2024-01-28-184116-768x399.png 768w, https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/Screenshot-2024-01-28-184116-1536x798.png 1536w, https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/Screenshot-2024-01-28-184116-2048x1064.png 2048w, https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/Screenshot-2024-01-28-184116-577x300.png 577w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<p>Here is proof of the completion of the included labs covering the topics discussed in the class.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"564\" src=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/Labs-1024x564.png\" alt=\"\" class=\"wp-image-392\" srcset=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/Labs-1024x564.png 1024w, https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/Labs-300x165.png 300w, https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/Labs-768x423.png 768w, https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/Labs-545x300.png 545w, https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-content\/uploads\/sites\/34320\/2026\/04\/Labs.png 1326w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>CS 462 serves as an introduction to networking and the Internet protocol stack. Then, the course covers cybersecurity topics using the Internet protocol stack as a foundation to understand those topics. Topics covered include an Introduction to networking and the Internet protocol stack; Vulnerable protocols such as HTTP, DNS, and BGP; Overview of wireless communications,&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/jadynrichardson\/cs-462-cybersecurity-fundamentals\/\">Read More<\/a><\/div>\n","protected":false},"author":27592,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/pages\/360"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/users\/27592"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/comments?post=360"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/pages\/360\/revisions"}],"predecessor-version":[{"id":393,"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/pages\/360\/revisions\/393"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jadynrichardson\/wp-json\/wp\/v2\/media?parent=360"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}