Introduction to Cybersecurity (CYSE 300)
Course Overview
CYSE 300 introduced foundational cybersecurity principles including system security, network vulnerabilities, risk management, cryptography, access control, and incident response. The course examined how organizations protect information assets and respond to cyber threats. Through quizzes, research papers, and hands-on InfoSec Learning laboratories, I practiced identifying vulnerabilities, implementing security controls, analyzing network traffic, and understanding how cybersecurity strategies protect enterprise systems.
Demonstration of Learning Outcomes
Identifying and Prioritizing Information Assets
Throughout this course I learned how organizations determine which systems and data are most critical to protect. Labs and coursework emphasized identifying sensitive data, authentication systems, network infrastructure, and enterprise services that must be secured to maintain operations and prevent data breaches.
Identifying and Prioritizing Threats
Course modules introduced common cyber threats such as malware, unauthorized access, insecure network services, and system misconfigurations. Through labs and case examples, I developed an understanding of how attackers exploit weaknesses and how security professionals assess risk to determine which threats require the most immediate attention.
Defining an Information Security Strategy
The course reinforced the concept of layered security, also known as defense-in-depth. Topics such as firewalls, system patching, access control policies, and monitoring tools demonstrated how organizations combine multiple security controls to protect systems from cyber threats.
Planning for and Responding to Security Incidents
Incident response procedures and forensic analysis labs introduced the process used by security teams to detect, investigate, and respond to security incidents. These exercises helped me understand the importance of identifying indicators of compromise and responding quickly to reduce damage from attacks.
Legal, Privacy, and Ethical Considerations
Discussions and research assignments addressed the legal implications of cybersecurity incidents, privacy protections, and responsible information management. These topics highlighted how security professionals must consider both technical and legal responsibilities when protecting information systems.
Disaster Recovery and Business Continuity
The course emphasized the importance of maintaining business operations after a security incident. Backup strategies, recovery procedures, and contingency planning were discussed as critical elements of protecting organizational data and restoring services after disruptions.
Laboratory Experience
This course included fifteen cybersecurity laboratories completed in the InfoSec Learning environment. These labs simulated real-world security scenarios and allowed me to practice identifying vulnerabilities, implementing defensive controls, and analyzing system behavior.
Lab: Securing the pfSense Firewall
In this lab I explored firewall configuration concepts using pfSense. The lab demonstrated how firewall rules control network traffic and how proper configuration helps prevent unauthorized access to internal systems.
Lab: Implementing NAT and Allowing Remote Access
This lab focused on network configuration concepts including Network Address Translation (NAT) and secure remote access. It reinforced how organizations manage internal network communication while maintaining controlled external connectivity.
Lab: Implementing Security Policies on Windows and Linux
This exercise demonstrated how operating system security policies protect systems from unauthorized access. I examined security configurations in both Windows and Linux environments and learned how administrators enforce secure system policies.
Lab: Incident Response Procedures and Forensic Analysis
In this lab I explored the fundamentals of incident response and digital forensics. The exercise demonstrated how security professionals investigate suspicious activity, analyze evidence, and determine the cause of security incidents.
Lab: Packet Analysis Using Wireshark and Network Miner
This lab introduced network packet analysis using Wireshark and Network Miner. By examining captured network traffic, I learned how analysts interpret protocol behavior and identify suspicious communication patterns within a network.
Lab: Active Directory in the Enterprise
This lab introduced enterprise identity management through Active Directory. It demonstrated how organizations manage users, permissions, and authentication within a centralized domain environment.
Research Papers
Research Paper 1 – Cybersecurity Threats and Emerging Risks
This paper explored modern cybersecurity threats and how organizations must adapt security strategies to defend against evolving attack techniques. The research examined the impact of cybercrime and emphasized the importance of proactive security measures and monitoring.
Research Paper 2 – Security Policy for Web Applications and Database Servers
This research paper analyzed the importance of implementing strong security policies for web applications and database servers. The paper discussed how organizations protect sensitive data through encryption, access control, patch management, and system monitoring.
Application to My Career Goals
CYSE 300 provided a foundational understanding of cybersecurity concepts and practices that are essential for a career in the field. The combination of theoretical learning and hands-on labs helped me understand how organizations identify vulnerabilities, implement security controls, and respond to cyber threats. This course strengthened my interest in cybersecurity and supports my goal of working in security operations or network security roles where protecting systems and analyzing threats are key responsibilities.