
This course focuses on tools and techniques involved in real-world cyber operations. It provides a
broad range of cybersecurity concepts and essential hands-on training for students who want to
become cybersecurity professionals. Students will learn the basic cybersecurity discipline, underline the model computing environment, and practice different tools and strategies to perform cyber attacks and defense operations.
CYSE 301 taught me how to navigate the command line in a higher level through using Linux and several applications such as Ubuntu, Kali, and various Windows systems. We were tasked with assignments like analyzing packets in Wireshark, ethical hacking, creating VPNs, password cracking, tracing traffic, and digital stenography to name a few. These complex tasks demonstrate how to apply cyber techniques and operational duties through real-world scenarios. Below is an example of an assignment I had to perform where I to create a VPN server. In this assignment I was tasked with creating my own virtual private network (VPN) server through the Google Cloud platform. I had to generate a user, configure the server, and create firewall rules.
CYSE-301-Assignment-7-Make-Your-Own-VPN-ServerThis class was very technical and required me to practice using the command line and additional applications to complete the assignments. My technical skills were put to the test and I enjoyed the challenges this class provided. I am very comfortable performing complex commands, navigating systems through the command line, and using applications to perform analysis. This course aligned with my value of responsibility because in order to succeed in this course, I had to practice. This helped to make this course fun and exciting for a future in penetration testing.