Introduction to Cybersecurity
This course provides an overview of the field of cybersecurity. It covers core cybersecurity topics including computer system architectures, critical infrastructures, cyber threats and vulnerabilities, cryptography, information assurance, network security, and risk assessment and management. Students are expected to become familiar with fundamental security concepts, technologies, and practices. This course provides a foundation for further study in cybersecurity.
The course objectives are:
- Identify and prioritize information assets;
- Identify and prioritize threats to information assets;
- Define an information security strategy and architecture;
- Plan for and respond to intruders in an information system;
- Describe legal and public relations implications of security and privacy issues; and
- Present a disaster recovery plan for recovery of information assets after an incident.
In-Class Labs
In-class cybersecurity laboratories covered material and provided a hands-on approach required for the CompTIA Security+ certification. Some topics included the following:
- Performing reconnaissance and probing using common tools;
- Performing a vulnerability assessment;
- Enabling Windows Active Directory and user access controls;
- Using group policy objects and Microsoft Baseline Security Analyzer for change control;
- Performing packet capture and traffic analysis;
- Using encryption to enhance confidentiality and integrity;
- Performing a website and database attack by exploiting identified vulnerabilities;
- Eliminating threats with a layered security approach; and
- Implementing an information systems security policy.
Research Papers
The Equifax 2017 Data Breach: Vulnerabilities, Repercussions, and Potential Mitigations: https://sites.wp.odu.edu/samantha-riggs/2024/12/06/the-equifax-2017-data-breach-vulnerabilities-repercussions-and-potential-mitigations/
Important Issues to Be Addressed in System Security Policies: https://sites.wp.odu.edu/samantha-riggs/2024/12/06/important-issues-to-be-addressed-in-system-security-policies/