Introduction to Cybersecurity
CYSE 300: Introduction to Cybersecurity provided me with a comprehensive foundation in cybersecurity, covering critical topics such as computer system architectures, cyber threats and vulnerabilities, cryptography, network security, and risk management. Through hands-on laboratory assignments and a detailed research paper, I gained practical experience in applying these principles to real-world scenarios. This tab highlights my journey through the course, showcasing how I developed the knowledge and skills to protect information systems effectively.
Course Material
Course Materials and How I Achieved Them:
1. Identify and prioritize information assets
How I Achieved This:
In the reconnaissance and probing lab, I used tools like Nmap and Wireshark to discover and catalog system assets, evaluating their criticality to organizational operations. This allowed me to understand which assets were essential to protect and why.
2. Identify and prioritize threats to information assets
How I Achieved This:
During the vulnerability assessment lab, I identified potential vulnerabilities in a simulated system using Tenable Nessus and categorized them by severity. This experience honed my ability to assess threats and their potential impact on prioritized assets.
3. Define an information security strategy and architecture
How I Achieved This:
While performing a layered security approach lab, I designed and implemented a security architecture that included firewalls, access control lists, and encryption. This ensured a robust defense against potential threats.
4. Plan for and respond to intruders in an information system
How I Achieved This:
In the website and database attack lab, I simulated an SQL injection attack and then deployed countermeasures, such as input validation and parameterized queries, to mitigate vulnerabilities. This reinforced my understanding of detecting and responding to intrusions.
5. Describe legal and public relations implications of security and privacy issues
How I Achieved This:
In my research paper, I examined the legal and reputational consequences of a real-world cybersecurity breach, focusing on regulatory requirements and best practices for handling such incidents.
6. Present a disaster recovery plan for recovery of information assets after an incident
How I Achieved This:
During the business continuity planning lab, I developed a disaster recovery plan detailing backup strategies, recovery time objectives (RTOs), and recovery point objectives (RPOs). This plan ensured minimal downtime and data loss in the event of a cybersecurity incident.