{"id":141,"date":"2024-09-17T20:01:33","date_gmt":"2024-09-17T20:01:33","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=141"},"modified":"2026-04-18T21:12:07","modified_gmt":"2026-04-18T21:12:07","slug":"cyse-300","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/cyse-300\/","title":{"rendered":"CYSE 300 &#8211; Cybersecurity Fundamentals"},"content":{"rendered":"\n<h1 class=\"wp-block-heading has-text-align-center\">Introduction to Cybersecurity<\/h1>\n\n\n\n<p class=\"has-text-align-center\">This course focuses on the field of cybersecurity and covers core cybersecurity topics including computer system architectures, critical infrastructures, cyber threats and vulnerabilities, cryptography, information assurance, network security, and risk assessment and management.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">In-Class Labs<\/h2>\n\n\n\n<p>In-class cybersecurity laboratories covered material and provided a hands-on approach required for the CompTIA Security+ certification. Some topics included the following:<\/p>\n\n\n\n<ul>\n<li>Performing reconnaissance and probing using common tools<\/li>\n\n\n\n<li>Performing a vulnerability assessment<\/li>\n\n\n\n<li>Using group policy objects and Microsoft Baseline Security Analyzer for change control<\/li>\n\n\n\n<li>Performing packet capture and traffic analysis<\/li>\n\n\n\n<li>Using encryption to enhance confidentiality and integrity<\/li>\n\n\n\n<li>Implementing an information systems security policy.<\/li>\n<\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Research Papers<\/h2>\n\n\n\n<p>The Equifax 2017 Data Breach: Vulnerabilities, Repercussions, and Potential Mitigations: <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-content\/uploads\/sites\/37046\/2026\/04\/CYSE-300-Short-Research-Paper-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"PDF embed\"><\/object><a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-content\/uploads\/sites\/37046\/2026\/04\/CYSE-300-Short-Research-Paper-1.pdf\" class=\"wp-block-file__button wp-element-button\" download><\/a><\/div>\n\n\n\n<p>Important Issues to Be Addressed in System Security Policies: <\/p>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-content\/uploads\/sites\/37046\/2026\/04\/CYSE-300-Short-Research-Paper-2.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"PDF embed\"><\/object><a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-content\/uploads\/sites\/37046\/2026\/04\/CYSE-300-Short-Research-Paper-2.pdf\" class=\"wp-block-file__button wp-element-button\" download><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Introduction to Cybersecurity This course focuses on the field of cybersecurity and covers core cybersecurity topics including computer system architectures, critical infrastructures, cyber threats and vulnerabilities, cryptography, information assurance, network security, and risk assessment and management. In-Class Labs In-class cybersecurity laboratories covered material and provided a hands-on approach required for the CompTIA Security+ certification. Some&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/cyse-300\/\">Read More<\/a><\/div>\n","protected":false},"author":29392,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages\/141"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/users\/29392"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages\/141\/revisions"}],"predecessor-version":[{"id":532,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages\/141\/revisions\/532"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/media?parent=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}