Cybersecurity Techniques and Operations

  • Week 1–2: Introduced the course environment and Linux basics. I learned how to navigate Linux using the command line and completed the first lab on basic Linux commands using the CCIA virtual lab.
  • Week 3–4: Focused on the OSI model, with emphasis on the Application, Transport, Network, and Data Link Layers. These weeks built foundational knowledge needed for understanding traffic flow and packet structure.

Network Traffic Analysis

  • Week 5: I used Wireshark to practice packet capture and analysis. This involved identifying different types of traffic, which laid the groundwork for understanding normal vs. suspicious activity.
  • Week 6: Reviewed prior material and prepared for Module 2, transitioning from analysis to protection and scanning.

Firewall and Network Scanning

  • Week 7: Learned how to set up and configure pfSense firewalls. I also practiced network scanning with Nmap, learning to identify open ports, running services, and potential vulnerabilities.
  • Module 2 Labs: Reinforced how attackers map networks and how defenders use firewalls to limit exposure.

Ethical Hacking and Penetration Testing

  • Week 8–10: Delved into ethical hacking and Windows penetration testing using tools like Metasploit. I explored how attackers escalate privileges and create payloads for testing system defenses.
  • Assignment 4: Demonstrated practical skills in ethical hacking and system exploitation in a controlled environment.

Wireless and Password Security

  • Week 11–12: Focused on password cracking techniques and wireless security. I learned how WEP and WPA are attacked using common tools, reinforcing the importance of secure configurations.
  • Assignments 5: Involved using tools to perform brute force attacks and crack Wi-Fi passwords in lab simulations.

Information Hiding and VPNs

  • Week 13: Introduced digital steganography, where I used tools like steghide to hide and extract messages in files.
  • Week 14: I configured my own VPN server using OpenVPN on Google Cloud Platform (GCP), learning how encrypted tunnels can secure remote communications.

Final Preparation

  • Week 15: Focused on review and final exam preparation, reinforcing all concepts from traffic analysis to firewall configuration, hacking tools, password security, and secure network design.

Skills and Competencies Gained

  • Linux fundamentals and command line proficiency
  • Packet analysis using Wireshark
  • Nmap scanning and vulnerability detection
  • pfSense firewall configuration
  • Ethical hacking and penetration testing basics
  • Password and wireless security (WEP/WPA)
  • Digital steganography and data hiding
  • VPN setup and secure communications

This course provided not only theoretical knowledge but also valuable hands-on experience in real-world cybersecurity scenarios. By the end, I gained practical insight into both offensive (attacker) and defensive (defender) perspectives in network security.