Cybersecurity Techniques and Operations
Introduces and focuses on tools and techniques involved in real-world cyber operations and provides a broad range of cybersecurity concepts and essential hands-on training.
Course Objectives
- Understand the rules and laws involved in real-world cyber operations,
- Understand the basic components of the model computing networks, and take different techniques to identify and trace the network traffic,
- Identify and evaluate the vulnerabilities in the network and implement effective countermeasures to protect the network from possible attacks,
- Understand how to plan, organize and perform penetration testing on a network, systems, and exploit their weaknesses accordingly,
- Manage data and personal information in a secure manner.
In-Class Labs
Labs performed in class as part of the standard coursework:
- Traffic Tracing and Analysis Using Wireshark
- pfSense Firewall and NMAP
- Metasploit Framework
- Password Cracking
- Wi-Fi Network Vulnerabilities and Decryption
- Digital Steganography Performed By s-tool and steghide