CYSE 462

Registered for Spring 2026
———————————————————Cybersecurity Fundamentals

Provides a comprehensive introduction to networking principles and their direct application to modern cybersecurity. The course begins with core Internet architecture and the protocol stack before transitioning into security vulnerabilities, defensive mechanisms, and applied cybersecurity operations.

The first half of the course builds foundational networking knowledge, including the Internet protocol stack, HTTP, DNS, TCP/IP, wireless networking, and IP addressing. The second half focuses on cybersecurity concepts such as cryptography, vulnerabilities and exploits, malware, wireless and application attacks, risk management, cyber operations, and defensive countermeasures.

Through hands-on labs, discussions, homework assignments, and exams, this course develops both conceptual understanding and practical analysis skills. The curriculum aligns closely with industry-recognized security principles and provides foundational preparation for certifications such as CompTIA Security+

Key Skills & Topics

Networking & Internet Architecture

  • Internet protocol stack (Application, Transport, Network, Link layers)
  • Client-server architecture
  • HTTP and DNS functionality and vulnerabilities
  • TCP connection establishment and transport-layer operations
  • IP addressing and CIDR
  • MAC addressing and packet traversal
  • Wireless vs. wired LAN security considerations

Cybersecurity Foundations

  • Common vulnerabilities in DNS, databases, and web applications
  • Malware types and attack classification
  • Wireless and application-layer attacks
  • Vulnerabilities, exploits, and countermeasures
  • Cyber kill chain and operational phases

Cryptography & Network Defense

  • Fundamental cryptographic concepts
  • Certificates and authentication mechanisms
  • Transport Layer Security (TLS)
  • Firewalls, VPNs, IDS/IPS
  • Kerberos and network-layer security

Risk & Security Management

  • Vulnerability mitigation strategies
  • Risk assessment and management principles
  • Defensive security architecture

Course Material


Quantum Encryption & the Limits of Foolproof Security

Module-6-DB-fd


The Five Laws of Cybersecurity and the Weakest Link Problem

Module-5-DB


Autonomous Vehicles and Cybersecurity: Risks, Realities, and the Case for Transparency

Module_4_DB_fd