CYSE 315

Introduction to CYSE 315: Networking for Cybersecurity

My CYSE 315 coursework established a comprehensive understanding of network architectures, protocols, and security mechanisms, forming the backbone of my ability to design, secure, and troubleshoot modern IT infrastructures. This course equipped me with hands-on expertise in configuring and defending networks against cyber threats while optimizing performance and reliability. Through labs, simulations, and real-world scenarios, I mastered the principles of data transmission, network segmentation, and threat detection—skills critical for safeguarding organizational assets in an interconnected world.

Key Coursework Highlights:

  • Network Design & Security: Configured routers, switches, and firewalls to enforce secure communication channels, applying principles like VLAN segmentation and ACLs (Access Control Lists).
  • Protocol Analysis: Analyzed TCP/IP, DNS, DHCP, and HTTP/S protocols using Wireshark to identify vulnerabilities and anomalous traffic patterns.
  • Network Hardening: Implemented VPNs, intrusion detection/prevention systems (IDS/IPS), and encryption protocols (e.g., TLS) to protect data in transit.
  • Cybersecurity Integration: Simulated and mitigated network-based attacks (e.g., DDoS, ARP spoofing, man-in-the-middle) using tools like Nessus and Qualys for vulnerability assessments.
  • Cloud & Hybrid Networks: Explored secure configurations for cloud environments (AWS/Azure basics) and hybrid networks, emphasizing zero-trust architectures.

Integration with Professional Experience:
This coursework directly complements my roles at EVMS and ODU Help Desk, where I resolved connectivity issues, deployed secure hardware (Dell/HP), and mitigated phishing attacks. For example, my understanding of network traffic analysis (via Wireshark) enhanced my ability to diagnose user connectivity challenges and identify malicious activity. Additionally, my CompTIA Security+ certification reinforced foundational networking security principles, such as secure protocol configuration and risk management, which I applied in RMF compliance projects.