CYSE 300

Introduction to Cybersecurity (CYSE 300)

Course Overview

CYSE 300 introduced foundational cybersecurity principles including system security, network vulnerabilities, risk management, cryptography, access control, and incident response. The course examined how organizations protect information assets and respond to cyber threats. Through quizzes, research papers, and hands-on InfoSec Learning laboratories, I practiced identifying vulnerabilities, implementing security controls, analyzing network traffic, and understanding how cybersecurity strategies protect enterprise systems.

Demonstration of Learning Outcomes

Identifying and Prioritizing Information Assets

Throughout this course I learned how organizations determine which systems and data are most critical to protect. Labs and coursework emphasized identifying sensitive data, authentication systems, network infrastructure, and enterprise services that must be secured to maintain operations and prevent data breaches.

Identifying and Prioritizing Threats

Course modules introduced common cyber threats such as malware, unauthorized access, insecure network services, and system misconfigurations. Through labs and case examples, I developed an understanding of how attackers exploit weaknesses and how security professionals assess risk to determine which threats require the most immediate attention.

Defining an Information Security Strategy

The course reinforced the concept of layered security, also known as defense-in-depth. Topics such as firewalls, system patching, access control policies, and monitoring tools demonstrated how organizations combine multiple security controls to protect systems from cyber threats.

Planning for and Responding to Security Incidents

Incident response procedures and forensic analysis labs introduced the process used by security teams to detect, investigate, and respond to security incidents. These exercises helped me understand the importance of identifying indicators of compromise and responding quickly to reduce damage from attacks.

Legal, Privacy, and Ethical Considerations

Discussions and research assignments addressed the legal implications of cybersecurity incidents, privacy protections, and responsible information management. These topics highlighted how security professionals must consider both technical and legal responsibilities when protecting information systems.

Disaster Recovery and Business Continuity

The course emphasized the importance of maintaining business operations after a security incident. Backup strategies, recovery procedures, and contingency planning were discussed as critical elements of protecting organizational data and restoring services after disruptions.

Laboratory Experience

This course included fifteen cybersecurity laboratories completed in the InfoSec Learning environment. These labs simulated real-world security scenarios and allowed me to practice identifying vulnerabilities, implementing defensive controls, and analyzing system behavior.

Lab: Securing the pfSense Firewall

In this lab I explored firewall configuration concepts using pfSense. The lab demonstrated how firewall rules control network traffic and how proper configuration helps prevent unauthorized access to internal systems.

Lab: Implementing NAT and Allowing Remote Access

This lab focused on network configuration concepts including Network Address Translation (NAT) and secure remote access. It reinforced how organizations manage internal network communication while maintaining controlled external connectivity.

Lab: Implementing Security Policies on Windows and Linux

This exercise demonstrated how operating system security policies protect systems from unauthorized access. I examined security configurations in both Windows and Linux environments and learned how administrators enforce secure system policies.

Lab: Incident Response Procedures and Forensic Analysis

In this lab I explored the fundamentals of incident response and digital forensics. The exercise demonstrated how security professionals investigate suspicious activity, analyze evidence, and determine the cause of security incidents.

Lab: Packet Analysis Using Wireshark and Network Miner

This lab introduced network packet analysis using Wireshark and Network Miner. By examining captured network traffic, I learned how analysts interpret protocol behavior and identify suspicious communication patterns within a network.

Lab: Active Directory in the Enterprise

This lab introduced enterprise identity management through Active Directory. It demonstrated how organizations manage users, permissions, and authentication within a centralized domain environment.

Research Papers

Research Paper 1 – Cybersecurity Threats and Emerging Risks

This paper explored modern cybersecurity threats and how organizations must adapt security strategies to defend against evolving attack techniques. The research examined the impact of cybercrime and emphasized the importance of proactive security measures and monitoring.

Research Paper 2 – Security Policy for Web Applications and Database Servers

This research paper analyzed the importance of implementing strong security policies for web applications and database servers. The paper discussed how organizations protect sensitive data through encryption, access control, patch management, and system monitoring.

Application to My Career Goals

CYSE 300 provided a foundational understanding of cybersecurity concepts and practices that are essential for a career in the field. The combination of theoretical learning and hands-on labs helped me understand how organizations identify vulnerabilities, implement security controls, and respond to cyber threats. This course strengthened my interest in cybersecurity and supports my goal of working in security operations or network security roles where protecting systems and analyzing threats are key responsibilities.