Cybersecurity Fundamentals
The Cybersecurity Fundamentals section highlights core courses that provide a strong foundation in cybersecurity concepts, techniques, and professional practices. These classes covered essential topics such as risk management, network security, security operations, cyber threats, and ethical considerations. Through a combination of discussions, research projects, and hands-on labs, I developed the technical skills and critical thinking abilities necessary for protecting information systems and responding to real-world cybersecurity challenges.
CS 462 – Cybersecurity Fundamentals
This course provided an introduction to cybersecurity principles, focusing on threats, vulnerabilities, risk management, and security policies. Throughout the course, I participated in weekly discussions that helped me apply core concepts to real-world cybersecurity challenges and develop critical thinking around security issues.
You can also view examples of my class discussion prompts and responses here.
CS 464 – Networked Security Systems
This course covered the design, implementation, and management of secure networked systems. I learned about cryptography, network security protocols, and defense strategies for protecting communication infrastructures. Assignments focused on analyzing risks and developing strategies for strengthening network defenses.
CYSE 300 – Introduction to Cybersecurity
This course introduced the foundations of cybersecurity, including cyber threats, basic security practices, legal and ethical issues, and industry standards. In addition to learning core concepts, I completed weekly discussions and research papers that deepened my understanding of emerging cybersecurity threats and best practices.
You can view my three research papers on Edward Snowden’s Cybersecurity Breach, Information Security Policies, and Privacy on the Web here.
You can also view examples of my class discussion prompts and responses here.
CYSE 301 – Cybersecurity Techniques and Operations
This course focused on practical cybersecurity techniques, including system hardening, incident response, and intrusion detection. A major part of the course involved completing Linux-based security labs, where I practiced defending operating systems against common cyber threats while applying operational security concepts.
You can view lab reports from this course, including Basic Linux Commands, Traffic Tracing and Sniffing, Sword vs. Shield, Ethical Hacking, Password Cracking, and Hide Your Secret! here.