CYSE 301

Cybersecurity Techniques and Operations

Course Description

This course focuses on tools and techniques involved in real-world cyber operations. It provides a
broad range of cybersecurity concepts and essential hands-on training for students who want to
become cybersecurity professionals. Students will learn the basic cybersecurity discipline, underline
the model computing environment, and practice different tools and strategies to perform cyber
attacks and defense operations.
After completing this course, students will be able to
• understand the rules and laws involved in real-world cyber operations,
• understand the basic components of the model computing networks, and take different
techniques to identify and trace the network traffic if an instruction is detected inside a
network,
• identify and evaluate the vulnerabilities in the network and implement effective countermeasures to protect the network from possible attacks,
• understand how to plan, organize and perform penetration testing on a network,
• understand different cryptographic protocols, tools, and mechanisms used for different
systems, and exploit their weaknesses accordingly,
• manage data and personal information in a secure manner.

Course Material

Basic Linux Commands

This assignment was an introduction to the COVA CCI interface for cyber students. This lab taught me how to configure virtual machines and went through basic Linux commands.

CYSE301_Lab1

Traffic Tracing and Sniffing

This assignment was the introduction to basic computer network concepts. It had us use Wireshark as a way to trace and sniff network traffic through different protocols.

CYSE301_Lab2

Sword and Shield

This assignment was a mix between offense and defense, as the title mentions. For this, I was introduced further to pfSense firewalls and how to set them up. The nmap command was used to assist in finding any vulnerabilities that the system may have had.

CYSE301_Lab3