How does your major relate to cybersecurity technology?
As described by the Cybersecurity (B.S.) page on the ODU web site, the program for my major is designed to provide students with the knowledge and the skills to deal with cybersecurity threats, which is a problem on many different fronts. The courses offered by this major are focused on technological aspects like computer science, information technology, and wireless networking, while also delving into topics regarding the social sciences of criminal justice, philosophy, and psychology. In order to be successful in my major, I will need to learn the fundamentals of cybersecurity technology. CYSE 250, or Basic Cybersecurity Programming and Networking, is a course that introduces these cybersecurity-centric programming and networking concepts. It is the technical base for students to take cybersecurity major courses, where they will develop problem solving skills, learn programming languages like C and assembly, and learn fundamentals of network protocols. CYSE 301, or Cybersecurity Techniques and Operations, is a course that teaches students the tools and techniques used to secure and analyze large computer networks and systems. These techniques include advanced packet analysis, firewall configuration, and penetration testing methods. My major is further involved in cybersecurity technology through the foundation and application classes provided to its students – thereby teaching them a solid understanding of cybersecurity technology before they go on to forge their careers. The careers that graduates of the B.S. in Cybersecurity can pursue are very much centered around cybersecurity technology. These include cybersecurity analysts, consultants, engineers, and architects, just to name a few. As an example, Information Security Analysts are tasked with planning, implementing, upgrading, or monitoring security measures to defend their computer networks and prevent the stealing of data from outsider threats. Cybersecurity analysts must have proper knowledge of these technologies so that they can ensure that the appropriate security controls are implemented into the computer network that are responsible for maintaining the safety of digital files and the vital electronic infrastructure.