{"id":141,"date":"2024-09-22T23:09:35","date_gmt":"2024-09-22T23:09:35","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=141"},"modified":"2025-06-16T09:40:50","modified_gmt":"2025-06-16T13:40:50","slug":"cyse-300","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/markwassef\/law-ethics\/cyse-300\/","title":{"rendered":"CYSE 300"},"content":{"rendered":"\n<h1 class=\"wp-block-heading\">Introduction to Cybersecurity<\/h1>\n\n\n\n<p>This course provides an overview of the field of cybersecurity. It covers core cybersecurity topics including computer system architectures, critical infrastructures, cyber threats and vulnerabilities, cryptography, information assurance, network security, and risk assessment and management. Students are expected to become familiar with fundamental security concepts, technologies, and practices. This course provides a foundation for further study in cybersecurity.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\">Course Material<\/h1>\n\n\n\n<p>I wrote a paper on the Equifax Breach linked below:&nbsp;<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-78e24d9e-55e6-49b6-b858-5512c5907213\" href=\"https:\/\/sites.wp.odu.edu\/markwassef\/wp-content\/uploads\/sites\/37243\/2024\/09\/The-Equifax-Data-Breach.docx\">The Equifax Data Breach<\/a><a href=\"https:\/\/sites.wp.odu.edu\/markwassef\/wp-content\/uploads\/sites\/37243\/2024\/09\/The-Equifax-Data-Breach.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-78e24d9e-55e6-49b6-b858-5512c5907213\">Download<\/a><\/div>\n\n\n\n<p>I also wrote a paper on Information Systems Security, and the importance of such a technology:<\/p>\n\n\n\n<div class=\"wp-block-file\"><a id=\"wp-block-file--media-cf12e0e0-31da-46ef-99f2-84d258dc194a\" href=\"https:\/\/sites.wp.odu.edu\/markwassef\/wp-content\/uploads\/sites\/37243\/2024\/09\/Information-System-Security.docx\">Information System Security<\/a><a href=\"https:\/\/sites.wp.odu.edu\/markwassef\/wp-content\/uploads\/sites\/37243\/2024\/09\/Information-System-Security.docx\" class=\"wp-block-file__button wp-element-button\" download aria-describedby=\"wp-block-file--media-cf12e0e0-31da-46ef-99f2-84d258dc194a\">Download<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Introduction to Cybersecurity This course provides an overview of the field of cybersecurity. It covers core cybersecurity topics including computer system architectures, critical infrastructures, cyber threats and vulnerabilities, cryptography, information assurance, network security, and risk assessment and management. Students are expected to become familiar with fundamental security concepts, technologies, and practices. This course provides a&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/markwassef\/law-ethics\/cyse-300\/\">Read More<\/a><\/div>\n","protected":false},"author":22471,"featured_media":0,"parent":93,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/markwassef\/wp-json\/wp\/v2\/pages\/141"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/markwassef\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/markwassef\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/markwassef\/wp-json\/wp\/v2\/users\/22471"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/markwassef\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/markwassef\/wp-json\/wp\/v2\/pages\/141\/revisions"}],"predecessor-version":[{"id":392,"href":"https:\/\/sites.wp.odu.edu\/markwassef\/wp-json\/wp\/v2\/pages\/141\/revisions\/392"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/markwassef\/wp-json\/wp\/v2\/pages\/93"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/markwassef\/wp-json\/wp\/v2\/media?parent=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}