Cybersecurity Techniques and Operations
This course introduces tools and techniques used to secure and analyze large computer networks and systems. Students will systematically learn C programming in the first part of the course, which forms a foundation for many cybersecurity operations, such as malware analysis, understanding network protocol stack, etc. In the second part, students will explore and map networks using a variety of diagnostic software tools, learn advanced packet analysis, configure firewalls, write intrusion detection rules, perform forensic investigation, and practice techniques for penetration testing. The objectives are:
- Understand the concepts and major constructs of the C programming language,
- Master the programming skills of the C programming language,
- Be able to analyze the C source code to infer the functionality of a given code segment, C function, C program etc,
- Grasp the needed techniques and skills to write a C program in cybersecurity operations such as a network protocol stack,
- Monitor and analyze network traffic. Identify and trace the traffic when intrusion is detected in the network,
- Identify and evaluate the vulnerabilities in the network and implement effective countermeasures to protect the network,
- Master the technologies to exploit the vulnerabilities in a remote system,
- Analyze the vulnerabilities in wireless communication network,
- Manage data and personal information in a secure manner.
Course Material
Assignment 2 focused on Traffic tracing and sniffing it was split into 2 parts/ First was instructions on how to use Wireshark and what to look for. The instructions give 6 questions that need to be answered by using Wireshark and what we just learned. Wireshark was not challenging to understand because everything was very explanatory.
Assignment 4 delved into the exciting realm of Ethical Hacking, presenting a series of tasks to conquer. From exploiting SMB on Windows XP using Metasploit to tackling various vulnerabilities, this assignment pushed me to expand my skills. Despite its increased complexity, it provided invaluable lessons in searching for and exploiting specific targets, enhancing my cybersecurity knowledge.
Assignment 6 holds a special place among my favorite assignments. It introduced me to the captivating world of digital steganography, where I learned to create hidden messages within cover images. The thrill of mastering this covert technique was amplified by the “pass or fail” grading system, adding an extra layer of excitement. This assignment marked the culmination of my journey and ignited a passion for creativity and problem-solving in cybersecurity.