{"id":292,"date":"2025-12-08T04:21:01","date_gmt":"2025-12-08T04:21:01","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/salahadino7\/?p=292"},"modified":"2025-12-08T04:47:09","modified_gmt":"2025-12-08T04:47:09","slug":"cyse-201s-course-content-page","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/salahadino7\/2025\/12\/08\/cyse-201s-course-content-page\/","title":{"rendered":"CYSE 201S COURSE CONTENT PAGE"},"content":{"rendered":"\n<p>This page includes&nbsp;<strong>all assignments, readings, reflections, photos, video journals, and free writes<\/strong>&nbsp;required for the course. The material is organized for clarity and demonstrates how I integrated academic knowledge with practical cybersecurity topics.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h1 class=\"wp-block-heading\">&nbsp;<strong>SECTION 1 \u2014 READINGS &amp; WRITE-UP REFLECTIONS<\/strong><\/h1>\n\n\n\n<p><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Making the Most of Learning with Perusall<\/strong><\/h3>\n\n\n\n<p>This reading introduced me to Perusall\u2019s collaborative learning platform. I learned how highlighting, annotating, and interacting with classmates enhances comprehension. It taught me the importance of active reading, which became useful throughout the course.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Cyber Trends \u2014 Perusall Warm-Up<\/strong><\/h3>\n\n\n\n<p>This practice assignment helped me get comfortable using Perusall. I explored major cybersecurity trends such as ransomware, phishing, social engineering, and the increasing sophistication of cyberattacks. This reading gave me a broad overview of modern cyber threats.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Exploring the Many Jobs in Cybersecurity<\/strong><\/h3>\n\n\n\n<p>I learned that cybersecurity includes a wide range of careers: analysts, threat hunters, SOC specialists, cybersecurity lawyers, digital forensics experts, and more. It showed me the diversity of opportunities in the field and helped me think about my own future direction. <\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The IT Organization<\/strong><\/h3>\n\n\n\n<p>This reading explained how IT departments are structured. I learned about teams such as operations, networking, security, and support. Understanding these roles helped me see how cybersecurity fits within a business.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Understanding the Components of a Business<\/strong><\/h3>\n\n\n\n<p>This assignment introduced me to key business concepts such as revenue, operations, risk, strategy, and leadership. It showed how cybersecurity supports business goals and protects essential assets.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>NIST Cybersecurity Framework \u2013 Version 2.0<\/strong><\/h3>\n\n\n\n<p>I learned about the five core functions of the NIST CSF:&nbsp;<strong>Identify, Protect, Detect, Respond, and Recover<\/strong>. This framework is used by organizations around the world to build cybersecurity programs. Understanding it helped me see how cybersecurity is standardized and applied in real-world settings.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Cybersecurity, Technology &amp; Society \u2013 Chapter 4: BioCybersecurity<\/strong><\/h3>\n\n\n\n<p>This reading explored the merging of biological science and cybersecurity. I learned how DNA data, genetic databases, and laboratory tools can create new vulnerabilities when they become digitized.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Hacking Humans: Protecting Our DNA from Cybercriminals<\/strong><\/h3>\n\n\n\n<p>This article highlighted the dangers of genetic data being stolen or manipulated. It introduced the idea that cyber threats now reach deeply into healthcare and biotechnology.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Malicious Code Written into DNA Infects the Computer That Reads It<\/strong><\/h3>\n\n\n\n<p>One of the most interesting readings, this article explained how researchers embedded malware into synthetic DNA to exploit sequencing machines. It demonstrated how cybersecurity is expanding into unexpected fields.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Recent Attacks on Critical Infrastructure<\/strong><\/h3>\n\n\n\n<p>This reading covered cyberattacks targeting hospitals, pipelines, power grids, and water systems. It helped me understand how critical infrastructure is vulnerable and why cybersecurity is essential to public safety.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Chapter 6 \u2013 Criminal Justice and Cybersecurity<\/strong><\/h3>\n\n\n\n<p>I learned how cybersecurity intersects with law enforcement. This includes digital evidence, investigation processes, criminal justice challenges, and how cybercrimes are prosecuted.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>CONCLUSION<\/strong><\/h1>\n\n\n\n<p>CYSE 201S expanded my understanding of cybersecurity far beyond technology. I learned:<\/p>\n\n\n\n<ul>\n<li>How human behavior influences cyber risk<\/li>\n\n\n\n<li>How social sciences help explain cybercrime<\/li>\n\n\n\n<li>How organizations structure and protect information<\/li>\n\n\n\n<li>How emerging fields like biotechnology connect to cybersecurity<\/li>\n\n\n\n<li>How critical infrastructure depends on digital safety<\/li>\n<\/ul>\n\n\n\n<p>This ePortfolio demonstrates my growth throughout the semester and the knowledge I will continue building in future cybersecurity classes.<\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\" \/>\n","protected":false},"excerpt":{"rendered":"<p>This page includes&nbsp;all assignments, readings, reflections, photos, video journals, and free writes&nbsp;required for the course. The material is organized for clarity and demonstrates how I integrated academic knowledge with practical cybersecurity topics. &nbsp;SECTION 1 \u2014 READINGS &amp; WRITE-UP REFLECTIONS Making the Most of Learning with Perusall This reading introduced me to Perusall\u2019s collaborative learning platform&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/salahadino7\/2025\/12\/08\/cyse-201s-course-content-page\/\">Read More<\/a><\/div>\n","protected":false},"author":31536,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/salahadino7\/wp-json\/wp\/v2\/posts\/292"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/salahadino7\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/salahadino7\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/salahadino7\/wp-json\/wp\/v2\/users\/31536"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/salahadino7\/wp-json\/wp\/v2\/comments?post=292"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/salahadino7\/wp-json\/wp\/v2\/posts\/292\/revisions"}],"predecessor-version":[{"id":294,"href":"https:\/\/sites.wp.odu.edu\/salahadino7\/wp-json\/wp\/v2\/posts\/292\/revisions\/294"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/salahadino7\/wp-json\/wp\/v2\/media?parent=292"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/salahadino7\/wp-json\/wp\/v2\/categories?post=292"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/salahadino7\/wp-json\/wp\/v2\/tags?post=292"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}