{"id":282,"date":"2024-12-07T00:52:55","date_gmt":"2024-12-07T00:52:55","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/jaquanclark413\/?page_id=282"},"modified":"2024-12-07T01:22:57","modified_gmt":"2024-12-07T01:22:57","slug":"basic-cybersecurity-programming","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/jaquanclark413\/basic-cybersecurity-programming\/","title":{"rendered":"Basic Cybersecurity Programming"},"content":{"rendered":"\n<p>This course introduces the cybersecurity-centric programming and networking concepts. Students will develop problem solving skills by using low-level programming languages (including C and assembly) and learn fundamentals of network protocols. This course is the technical base for students to take cybersecurity major courses.<\/p>\n\n\n\n<ul>\n<li><strong>Programming Fundamentals<\/strong><\/li>\n\n\n\n<li>Understanding basic programming concepts (variables, data types, operators, control flow)<\/li>\n\n\n\n<li>Familiarity with basic syntax and structure of programming languages (e.g., Python, C, Java)<\/li>\n\n\n\n<li>Knowledge of functions, loops, and conditionals to control program flow<\/li>\n\n\n\n<li>Understanding data structures (e.g., arrays, lists, dictionaries, sets) and their use in security programs<\/li>\n<\/ul>\n\n\n\n<ul>\n<li><strong>Secure Coding Practices<\/strong><\/li>\n\n\n\n<li>Writing secure code by identifying and avoiding common vulnerabilities (e.g., buffer overflows, input validation issues)<\/li>\n\n\n\n<li>Ensuring proper input validation to prevent SQL injection, cross-site scripting (XSS), and command injection<\/li>\n\n\n\n<li>Using parameterized queries and prepared statements to prevent SQL injection<\/li>\n\n\n\n<li>Implementing output encoding to avoid XSS and other injection attacks<\/li>\n\n\n\n<li>Proper error handling to avoid information leakage through error messages<\/li>\n<\/ul>\n\n\n\n<ul>\n<li><strong>Cryptography and Encryption<\/strong><\/li>\n\n\n\n<li>Understanding basic encryption algorithms (e.g., AES, RSA, DES)<\/li>\n\n\n\n<li>Implementing symmetric and asymmetric encryption in code<\/li>\n\n\n\n<li>Understanding the difference between hashing (e.g., SHA-256) and encryption<\/li>\n\n\n\n<li>Using cryptographic libraries to implement encryption in applications (e.g., OpenSSL, PyCryptodome)<\/li>\n\n\n\n<li>Implementing password hashing using strong hashing algorithms (e.g., bcrypt, Argon2)<\/li>\n<\/ul>\n\n\n\n<ul>\n<li><strong>Network Security Programming<\/strong><\/li>\n\n\n\n<li>Writing programs for network communication using protocols like TCP\/IP and UDP<\/li>\n\n\n\n<li>Using sockets in programming to establish secure communication (e.g., in Python or C)<\/li>\n\n\n\n<li>Implementing SSL\/TLS encryption for securing data in transit<\/li>\n\n\n\n<li>Writing code to detect and prevent MITM (Man-in-the-Middle) attacks<\/li>\n\n\n\n<li>Creating network monitoring tools to detect vulnerabilities or threats in network traffic<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>This course introduces the cybersecurity-centric programming and networking concepts. Students will develop problem solving skills by using low-level programming languages (including C and assembly) and learn fundamentals of network protocols. <a class=\"more-link\" href=\"https:\/\/sites.wp.odu.edu\/jaquanclark413\/basic-cybersecurity-programming\/\">Continue Reading &rarr;<\/a><\/p>\n","protected":false},"author":21899,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/jaquanclark413\/wp-json\/wp\/v2\/pages\/282"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/jaquanclark413\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/jaquanclark413\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaquanclark413\/wp-json\/wp\/v2\/users\/21899"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/jaquanclark413\/wp-json\/wp\/v2\/comments?post=282"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/jaquanclark413\/wp-json\/wp\/v2\/pages\/282\/revisions"}],"predecessor-version":[{"id":318,"href":"https:\/\/sites.wp.odu.edu\/jaquanclark413\/wp-json\/wp\/v2\/pages\/282\/revisions\/318"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/jaquanclark413\/wp-json\/wp\/v2\/media?parent=282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}