Cybersecurity Techniques and Operations (CYSE 301)
Course Overview
CYSE 301 focused on the practical tools and techniques used in cybersecurity operations. The course introduced network traffic analysis, vulnerability scanning, penetration testing, password cracking, wireless security, and digital steganography. Students also learned the fundamentals of the C programming language, which is commonly used in cybersecurity for malware analysis, system programming, and understanding network protocols.
Through programming assignments and hands-on cybersecurity labs, I gained experience analyzing network traffic, identifying vulnerabilities, performing penetration testing, and using cybersecurity tools commonly used in real-world security operations.
Learning Outcomes
C Programming Foundations
The first part of the course focused on learning the C programming language. This programming knowledge helps cybersecurity professionals understand how software works at a lower level and how vulnerabilities can exist inside programs.
During the programming portion of the course I practiced writing and analyzing C programs that perform different tasks such as string manipulation, pointer operations, and command-line programs.
Examples of programming assignments include:
-
Writing a function htoi(s) to convert hexadecimal strings into integer values.
-
Writing a function any(s1, s2) that identifies where characters from one string appear in another.
-
Using pointers to concatenate strings using a custom strcat function.
-
Writing a program that evaluates reverse polish expressions from the command line.
-
Writing a program that compares two files and detects the first line where they differ.
These exercises helped strengthen my programming logic and improved my ability to understand how software operates internally.
Cybersecurity Laboratory Experience
The second half of the course focused on hands-on cybersecurity operations using tools commonly used by security professionals.
Traffic Tracing and Network Analysis
In this lab I used Wireshark and TCPdump to capture and analyze network traffic. I learned how to inspect packets, understand protocol behavior, and trace suspicious activity across a network.
This lab helped develop the ability to investigate network communications and identify abnormal traffic patterns.
Firewall Configuration with pfSense
This lab involved configuring a pfSense firewall to protect a network environment. I practiced setting firewall rules and analyzing how traffic flows through a protected network.
This experience demonstrated how firewalls help prevent unauthorized access and protect internal systems.
Network Vulnerability Scanning
In this lab I used Nmap to scan networks and identify potential vulnerabilities. Network scanning allows security professionals to detect open ports, running services, and potential weaknesses that attackers may exploit.
Penetration Testing
This lab introduced penetration testing techniques using the Metasploit framework. I practiced identifying vulnerabilities in Windows systems and executing controlled attacks to demonstrate how systems can be compromised.
This exercise helped demonstrate how attackers exploit weaknesses and why proper security configurations are important.
Password Cracking
This lab explored how passwords are stored in operating systems and how attackers attempt to break weak passwords. Using password cracking tools in Linux and Windows environments, I learned why strong password policies and hashing methods are critical for protecting user accounts.
Wireless Network Security
This lab examined vulnerabilities in Wi-Fi networks and demonstrated how attackers can intercept or crack wireless communications when security settings are weak.
The lab emphasized the importance of secure wireless encryption protocols.
Digital Steganography
In this exercise I explored digital steganography, which is the process of hiding information within files such as images. Using tools such as steghide, I practiced hiding and extracting hidden data.
This lab demonstrated how attackers and security professionals may conceal or discover hidden information.
Course Skills and Tools
Throughout CYSE 301 I gained hands-on experience with several cybersecurity tools and technologies including:
-
Wireshark
-
TCPdump
-
Nmap
-
Metasploit Framework
-
pfSense Firewall
-
Linux security tools
-
Password cracking tools
-
Digital steganography tools
These tools are widely used in cybersecurity operations, network security analysis, and penetration testing.
Application to My Career Goals
CYSE 301 provided practical experience using real cybersecurity tools and techniques. The course strengthened my ability to analyze network traffic, identify vulnerabilities, and understand how attacks occur in real systems.
The skills developed in this course support my goal of working in cybersecurity and network security roles where monitoring networks, investigating threats, and protecting systems are essential responsibilities.