CYSE 300

Introduction to Cybersecurity

Course Grade Received: A

This course provides an overview of the field of cybersecurity. It covers core cybersecurity topics including computer system architectures, critical infrastructures, cyber threats and vulnerabilities, cryptography, information assurance, network security, and risk assessment and management. Students are expected to become familiar with fundamental security concepts, technologies, and practices. This course provides a foundation for further study in cybersecurity.

The course objectives are:

  • Identify and prioritize information assets;
  • Identify and prioritize threats to information assets;
  • Define an information security strategy and architecture;
  • Plan for and respond to intruders in an information system;
  • Describe legal and public relations implications of security and privacy issues; and
  • Present a disaster recovery plan for recovery of information assets after an incident.

Course Material

In CYSE 300 I engaged in a variety of educational assignments. I discussed various topics with classmates through discussion board topics weekly. Some of these topics containing assessing about vulnerability likelihood values, ethical hacking, penetration testing, and other topics concering the week’s reading. Along with these discussion boards I would also complete a weekly quiz and lab. The labs allowed for hands on learning through a variety of events and goals as listed below.

The cybersecurity laboratories include the following:

  • Performing reconnaissance and probing using common tools;
  • Performing a vulnerability assessment;
  • Enabling Windows Active Directory and user access controls;
  • Using group policy objects and Microsoft Baseline Security Analyzer for change control;
  • Performing packet capture and traffic analysis;
  • Implementing a business continuity plan;
  • Using encryption to enhance confidentiality and integrity;
  • Performing a website and database attack by exploiting identified vulnerabilities;
  • Eliminating threats with a layered security approach; and
  • Implementing an information systems security policy.