CYSE 301

CYSE 301: Cybersecurity Techniques and Operations

Course Description

CYSE 301 focuses on real-world cybersecurity techniques and operations, providing hands-on experience in network traffic analysis, penetration testing, password security, wireless security, and digital steganography. This course builds on foundational Linux knowledge from CYSE 270 and introduces both offensive and defensive cybersecurity tactics.

The course emphasizes practical training in a controlled virtual lab environment, enabling students to simulate cyber attacks, analyze vulnerabilities, and implement security countermeasures.

Key Learning Objectives

✅ Understand the rules and laws governing cybersecurity operations.
✅ Analyze and trace network traffic for intrusion detection.
✅ Perform vulnerability assessments and implement security countermeasures.
✅ Conduct penetration testing using the Metasploit Framework.
✅ Crack and secure passwords across different systems.
✅ Identify and exploit Wi-Fi vulnerabilities and implement wireless security measures.
✅ Perform digital steganography techniques using steghide and other tools.
✅ Securely manage personal and enterprise data to prevent breaches.

Topics & Hands-on Labs Completed

📌 Traffic Tracing & Network Analysis – Used Wireshark/tshark to monitor and analyze network traffic for suspicious activity.
📌 Network Scanning & Firewalls – Configured pfSense firewall, conducted Nmap scanning to identify vulnerabilities.
📌 Penetration Testing – Used the Metasploit Framework to enumerate and exploit system vulnerabilities.
📌 Password Cracking – Explored password hashing mechanisms and used cracking tools like John the Ripper and Hashcat.
📌 Wireless Security – Analyzed Wi-Fi vulnerabilities, decrypted encrypted traffic, and tested WPA2 security.
📌 Digital Steganography – Used Steghide and S-Tool to conceal and extract data from images and audio files.

Skills Acquired

🔹 Network Traffic Analysis using Wireshark and Tshark.
🔹 Firewall Configuration & Network Security with pfSense.
🔹 Vulnerability Assessment & Penetration Testing with Nmap and Metasploit.
🔹 Password Cracking & Security Hardening with Hashcat and John the Ripper.
🔹 Wi-Fi Security & Encryption Analysis using wireless auditing tools.
🔹 Digital Steganography Techniques for hidden data analysis.

Tools & Technologies Used

  • Linux Distributions: Kali Linux, Ubuntu
  • Network Analysis Tools: Wireshark, Tshark
  • Penetration Testing Tools: Metasploit, Nmap
  • Password Cracking Tools: John the Ripper, Hashcat
  • Firewall Security: pfSense
  • Wireless Security Tools: Aircrack-ng, Reaver
  • Steganography Tools: Steghide, S-Tool

Personal Reflection

This course has provided valuable hands-on experience in both offensive and defensive cybersecurity techniques. The practical labs in network security, penetration testing, and cryptographic analysis have strengthened my ability to identify threats, assess vulnerabilities, and apply security countermeasures in real-world scenarios. My work in this course aligns with my career goals in cybersecurity operations, network defense, and vulnerability management.