{"id":141,"date":"2025-01-22T00:08:27","date_gmt":"2025-01-22T00:08:27","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=141"},"modified":"2026-03-22T14:15:46","modified_gmt":"2026-03-22T14:15:46","slug":"cyse-300","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/locky\/coursework\/cybersecurity-foundations\/cyse-300\/","title":{"rendered":"CYSE 300"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-center\">Course Grade Received: A<\/h2>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\">Introduction to Cybersecurity<\/h1>\n\n\n\n<p class=\"has-text-align-justify\">This course provided a comprehensive overview of cybersecurity principles, including threat landscapes, risk management strategies, and defensive security frameworks. Students analyzed vulnerabilities, explored cryptographic foundations, and developed an understanding of how security is implemented across systems and networks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd0d Applied Knowledge &amp; Analysis<\/h2>\n\n\n\n<ul>\n<li>Analyzed real-world cyber threats and mapped them to security controls<\/li>\n\n\n\n<li>Evaluated vulnerabilities using risk-based thinking (likelihood vs impact)<\/li>\n\n\n\n<li>Applied the CIA triad to system design and decision-making<\/li>\n\n\n\n<li>Interpreted basic cryptographic concepts and their real-world use cases<\/li>\n\n\n\n<li>Explored governance, risk, and compliance (GRC) principles<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd10 Core Frameworks &amp; Principles<\/h2>\n\n\n\n<ul>\n<li>CIA Triad<\/li>\n\n\n\n<li>Risk Management Framework (RMF basics)<\/li>\n\n\n\n<li>Defense-in-Depth<\/li>\n\n\n\n<li>Least Privilege<\/li>\n\n\n\n<li>Threat Modeling Basics<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83e\udde0 Security Mindset Development<\/h2>\n\n\n\n<blockquote class=\"wp-block-quote\">\n<p>This course helped transition my thinking from general IT knowledge to a security-focused mindset, where systems are evaluated not just for functionality, but for resilience against threats, misuse, and adversarial behavior.<\/p>\n<\/blockquote>\n\n\n\n<h2 class=\"wp-block-heading\">\ud83d\udd17 Independent Exploration<\/h2>\n\n\n\n<p>To reinforce foundational concepts from CYSE 300, I am revisiting core cybersecurity topics through independent lab work and research, including:<\/p>\n\n\n\n<ul>\n<li>Building a basic threat model for a web application<\/li>\n\n\n\n<li>Mapping vulnerabilities to mitigation strategies<\/li>\n\n\n\n<li>Practicing risk assessment using real-world scenarios<\/li>\n\n\n\n<li>Reviewing cryptographic implementations in modern systems<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Course Topics &amp; Lab Coverage<\/h2>\n\n\n\n<ul>\n<li>Prioritized information assets and assessed associated risks<\/li>\n\n\n\n<li>Identified and evaluated threats using structured risk analysis<\/li>\n\n\n\n<li>Developed foundational security strategies and architectures<\/li>\n\n\n\n<li>Planned and responded to simulated intrusion scenarios<\/li>\n\n\n\n<li>Analyzed legal and public relations implications of security incidents<\/li>\n\n\n\n<li>Designed a disaster recovery and business continuity approach<\/li>\n<\/ul>\n\n\n\n<p>The cybersecurity laboratories include the following:<\/p>\n\n\n\n<ul>\n<li>Conducted reconnaissance and probing using industry-standard tools<\/li>\n\n\n\n<li>Performed vulnerability assessments and risk evaluations<\/li>\n\n\n\n<li>Configured Active Directory and implemented access controls<\/li>\n\n\n\n<li>Applied Group Policy and security baselines for system hardening<\/li>\n\n\n\n<li>Analyzed network traffic using packet capture tools<\/li>\n\n\n\n<li>Implemented encryption to protect confidentiality and integrity<\/li>\n\n\n\n<li>Simulated web and database attacks to understand exploitation techniques<\/li>\n\n\n\n<li>Applied layered security strategies to mitigate threats<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Key Skills &amp; Topics<\/h2>\n\n\n\n<ul>\n<li>Risk management &amp; threat modeling<\/li>\n\n\n\n<li>Cryptography fundamentals<\/li>\n\n\n\n<li>Security architecture &amp; design<\/li>\n\n\n\n<li>Vulnerability analysis<\/li>\n\n\n\n<li>CIA triad &amp; security controls<\/li>\n\n\n\n<li>Governance, risk, and compliance (GRC)<\/li>\n\n\n\n<li>Incident response basics<\/li>\n<\/ul>\n\n\n\n<h1 class=\"wp-block-heading has-text-align-center\">Course Material<\/h1>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Artificial Intelligence in Digital Forensics: Opportunities, Risks, and Future Directions<\/h2>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/11\/CYSE-300-DB-12-fd.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">CYSE-300-DB-12-fd<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-1 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/11\/CYSE-300-DB-12-fd.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen &amp; Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Internet of Things (IoT): Security Challenges<\/h2>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/09\/DB-Module-2-Discussion-Topic-IoT-fd-portfolio.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">DB-Module-2-Discussion-Topic-IoT-fd-portfolio<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-2 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/09\/DB-Module-2-Discussion-Topic-IoT-fd-portfolio.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen &amp; Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">The <em>NotPetya <\/em>Cybersecurity Attack &amp; Breach<\/h2>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/09\/CYSE-300-Short-Paper-fd-portfolio.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">CYSE-300-Short-Paper-fd-portfolio<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-3 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/09\/CYSE-300-Short-Paper-fd-portfolio.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen &amp; Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h2 class=\"wp-block-heading has-text-align-center\">Security Polices from a CISO\u2019s Perspective<\/h2>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/09\/CYSE-300-Short-Paper-2-fd-ePortfolio.pdf\" class=\"pdfemb-viewer\" style=\"\" data-width=\"max\" data-height=\"max\"  data-toolbar=\"both\" data-toolbar-fixed=\"on\">CYSE-300-Short-Paper-2-fd-ePortfolio<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<ul class=\"wp-block-social-links has-normal-icon-size has-visible-labels has-icon-color has-icon-background-color is-style-default is-horizontal is-content-justification-center is-layout-flex wp-container-core-social-links-layout-4 wp-block-social-links-is-layout-flex\"><li style=\"color: #ffffff; background-color: #cf2e2e; \" class=\"wp-social-link wp-social-link-chain has-white-color wp-block-social-link\"><a rel=\"https:\/\/www.credly.com\/users\/carl-lochstampfor-jr noopener nofollow\" target=\"_blank\" href=\"http:\/\/sites.wp.odu.edu\/locky\/wp-content\/uploads\/sites\/38189\/2025\/09\/CYSE-300-Short-Paper-2-fd-ePortfolio.pdf\" class=\"wp-block-social-link-anchor\"><svg width=\"24\" height=\"24\" viewBox=\"0 0 24 24\" version=\"1.1\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" aria-hidden=\"true\" focusable=\"false\"><path d=\"M15.6,7.2H14v1.5h1.6c2,0,3.7,1.7,3.7,3.7s-1.7,3.7-3.7,3.7H14v1.5h1.6c2.8,0,5.2-2.3,5.2-5.2,0-2.9-2.3-5.2-5.2-5.2zM4.7,12.4c0-2,1.7-3.7,3.7-3.7H10V7.2H8.4c-2.9,0-5.2,2.3-5.2,5.2,0,2.9,2.3,5.2,5.2,5.2H10v-1.5H8.4c-2,0-3.7-1.7-3.7-3.7zm4.6.9h5.3v-1.5H9.3v1.5z\"><\/path><\/svg><span class=\"wp-block-social-link-label\">Full Screen &amp; Download<\/span><\/a><\/li><\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n","protected":false},"excerpt":{"rendered":"<p>Explores core cybersecurity principles including threat modeling, risk management, cryptography, and security architecture fundamentals.<\/p>\n","protected":false},"author":30379,"featured_media":0,"parent":95,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"advanced_seo_description":"Hands-on cybersecurity and networking programming using Python, Linux, and scripting for automation, analysis, and secure system operations.","jetpack_seo_html_title":"CYSE 250 Cybersecurity & Networking Programming | ODU","jetpack_seo_noindex":false,"footnotes":""},"jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/141"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/users\/30379"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/141\/revisions"}],"predecessor-version":[{"id":2281,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/141\/revisions\/2281"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/pages\/95"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/locky\/wp-json\/wp\/v2\/media?parent=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}