{"id":141,"date":"2024-09-17T20:01:33","date_gmt":"2024-09-17T20:01:33","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/cyberimpact1\/?page_id=141"},"modified":"2026-05-18T01:57:32","modified_gmt":"2026-05-18T01:57:32","slug":"cyse-300","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/cyse-300\/","title":{"rendered":"CYSE 300 &#8211; Introduction to Cybersecurity"},"content":{"rendered":"\n<p class=\"has-text-align-center\">This course focused on the field of cybersecurity and covered core cybersecurity topics including computer system architectures, critical infrastructures, cyber threats and vulnerabilities, cryptography, information assurance, network security, and risk assessment and management.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">In-Class Labs<\/h2>\n\n\n\n<p>In-class cybersecurity laboratories covered material and provided a hands-on approach required for the CompTIA Security+ certification. Some topics included the following:<\/p>\n\n\n\n<ul>\n<li>Performing reconnaissance and probing using common tools<\/li>\n\n\n\n<li>Performing a vulnerability assessment<\/li>\n\n\n\n<li>Using group policy objects and Microsoft Baseline Security Analyzer for change control<\/li>\n\n\n\n<li>Performing packet capture and traffic analysis<\/li>\n\n\n\n<li>Using encryption to enhance confidentiality and integrity<\/li>\n\n\n\n<li>Implementing an information systems security policy.<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Research Papers<\/h2>\n\n\n\n<p><strong>The Equifax 2017 Data Breach: Vulnerabilities, Repercussions, and Potential Mitigations: <\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-content\/uploads\/sites\/37046\/2026\/04\/CYSE-300-Short-Research-Paper-1.pdf\" class=\"pdfemb-viewer\" style=\"width: 1000px; height: 800px; \" data-width=\"1000\" data-height=\"800\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"on\">CYSE-300-Short-Research-Paper-1<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Important Issues to Be Addressed in System Security Policies: <\/strong><\/p>\n\n\n<a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-content\/uploads\/sites\/37046\/2026\/04\/CYSE-300-Short-Research-Paper-2.pdf\" class=\"pdfemb-viewer\" style=\"width: 1000px; height: 800px; \" data-width=\"1000\" data-height=\"800\"  data-toolbar=\"bottom\" data-toolbar-fixed=\"on\">CYSE-300-Short-Research-Paper-2<br\/><\/a>\n<p class=\"wp-block-pdfemb-pdf-embedder-viewer\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This course focused on the field of cybersecurity and covered core cybersecurity topics including computer system architectures, critical infrastructures, cyber threats and vulnerabilities, cryptography, information assurance, network security, and risk assessment and management. In-Class Labs In-class cybersecurity laboratories covered material and provided a hands-on approach required for the CompTIA Security+ certification. Some topics included the&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/samantha-riggs\/cyse-300\/\">Read More<\/a><\/div>\n","protected":false},"author":29392,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages\/141"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/users\/29392"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/comments?post=141"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages\/141\/revisions"}],"predecessor-version":[{"id":673,"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/pages\/141\/revisions\/673"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/samantha-riggs\/wp-json\/wp\/v2\/media?parent=141"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}