CYSE 200T

Course Grade Received: A


Cybersecurity, Technology, and Society

This course introduced foundational concepts in information technology and cybersecurity, including system components, networking basics, and core security principles. It provided a baseline understanding of how computing systems operate and how security is applied across modern digital environments.

🧠 Cybersecurity Concepts in Practice

This course established my foundational understanding of how systems, networks, and users interact within a cybersecurity context. I began analyzing technology not just for functionality, but for potential vulnerabilities, misconfigurations, and security risks.

🛡️ Core Frameworks & Principles

  • Basic networking concepts (IP addressing, protocols)
  • System architecture fundamentals
  • Introduction to cybersecurity principles
  • CIA Triad (Confidentiality, Integrity, Availability)
  • Basic risk awareness and threat identification

🔍 Applied Knowledge & Analysis

  • Identified core components of computing systems and their security implications
  • Analyzed basic network communication and potential points of vulnerability
  • Applied foundational cybersecurity concepts to simple system scenarios
  • Recognized common threats and basic mitigation strategies
  • Developed an understanding of how misconfigurations can lead to security risks

🧠 Security Mindset Development

This course introduced the importance of thinking about technology from a security perspective early on, emphasizing that even basic systems and configurations can introduce risk if not properly understood and managed.


🔗 Course Topics & Practical Exposure

  • System components and architecture
  • Networking fundamentals (TCP/IP basics)
  • Operating system basics
  • Introduction to cybersecurity concepts
  • Basic troubleshooting and system analysis
  • Understanding user roles and access control

🧰 Key Skills & Topics

  • IT Fundamentals
  • Networking Basics
  • Cybersecurity Foundations
  • System Analysis
  • Risk Awareness
  • Troubleshooting

Course Material


Ensuring Accessibility when Implementing the CIA Triad


The CIA Triad & the AAA Framework


Human Factors: A CISO’s Response to Human Error & Threats


Exploring Attacks on Availability: Rootkits


ICS SCADA: Their Role & Importance