Cybersecurity Techniques and Operations
This course focused on tools and techniques involved in real-world cyber operations. It provided a
broad range of cybersecurity concepts and essential hands-on training for students who want to
become cybersecurity professionals. During this course, I learned the basic cybersecurity discipline, underlining the model computing environment, and practiced different tools and strategies to perform cyber attacks and defense operations. Specific skills I learned included:
- understanding the rules and laws involved in real-world cyber operations,
- understanding the basic components of the model computing networks, and take different techniques to identify and trace the network traffic if an instruction is detected inside network,
- identifying and evaluating the vulnerabilities in the network and implementing effective countermeasures to protect the network from possible attacks,
- understanding how to plan, organize and perform penetration testing on a network
- understanding different cryptographic protocols, tools, and mechanisms used for different systems, and exploit their weaknesses accordingly
- managing data and personal information in a secure manner
Labs
Here is a sample of some of the labs I did during this class: