COURSE NUMBER


Introduction to Cybersecurity

This course provided a comprehensive overview of the field of cybersecurity, covering core topics such as computer system architectures, critical infrastructures, cyber threats and vulnerabilities, cryptography, information assurance, network security, and risk assessment and management. Throughout the course, I developed a strong foundation in fundamental security concepts, technologies, and practices, which has significantly enhanced my understanding of the cybersecurity field.

Course Objectives:

  • Identified and prioritized information assets.

  • Identified and prioritized threats to information assets.

  • Defined an information security strategy and architecture.

  • Planned for and responded to intruders in information systems.

  • Described legal and public relations implications of security and privacy issues.

  • Presented a disaster recovery plan for recovery of information assets after an incident.

Course Work Overview

During the course, I actively engaged with all the learning objectives, as demonstrated through various lab assignments and assessments. These assignments not only allowed me to apply theoretical knowledge to real-world scenarios but also enhanced my practical skills in cybersecurity.

Key assignments include:

  • Lab #13: Capturing and Analyzing Network Traffic Using a Sniffer: This lab helped me develop proficiency in network traffic analysis, a critical skill for identifying potential security threats.

  • Lab #14: Attacking the Firewall and Stealing Data Over an Encrypted Channel: In this lab, I learned how attackers exploit encrypted channels to steal data, enhancing my understanding of encryption vulnerabilities.

  • Lab #15: Using Browser Exploitation to Take Over a Host’s Computer: This exercise highlighted the importance of securing browsers, demonstrating how vulnerabilities in browsers can be used to compromise a system.

  • Lab #11: Crafting and Deploying Malware Using a Remote Access Trojan (RAT): In this lab, I explored how attackers craft and deploy malware, giving me insight into how these threats can be mitigated.

Through these and other labs, I gained hands-on experience in activities such as performing reconnaissance, scanning networks, exploiting vulnerabilities, and implementing security measures like Active Directory and group policy objects. Each lab was structured to simulate real-world cybersecurity challenges, preparing me for practical applications in the field.

Research Paper and Other Key Deliverables

In addition to the lab assignments, I completed a comprehensive research paper and several quizzes and discussions that reinforced my understanding of key cybersecurity concepts. My research focused on topics that align closely with industry practices, such as risk assessment and network security strategies.

Future Application

The skills and knowledge I gained from this course will be instrumental as I advance in my cybersecurity career, particularly in areas like information system security, network defense, and risk management. Moving forward, I plan to apply these concepts to real-world cybersecurity challenges, ensuring that systems are secure and resilient against potential threats.