CYSE-301
Cybersecurity Techniques and Operations
This course introduced tools and techniques used to secure and analyze large computer networks and systems. It provided a strong foundation in C programming, which is critical for various cybersecurity operations, such as malware analysis and understanding the network protocol stack. The second part of the course focused on advanced network security practices, including packet analysis, firewall configuration, forensic investigation, and penetration testing.
Course Objectives:
Understood the concepts and major constructs of the C programming language.
Mastered programming skills in C to support cybersecurity operations.
Analyzed C source code to infer the functionality of code segments.
Applied C programming techniques in cybersecurity contexts, such as network protocol stacks.
Monitored and analyzed network traffic to detect and trace intrusions.
Identified and evaluated network vulnerabilities and implemented effective countermeasures.
Mastered the technologies to exploit vulnerabilities in remote systems.
Analyzed vulnerabilities in wireless communication networks.
Managed data and personal information securely.
Course Work Overview
Throughout the course, I engaged deeply with the programming assignments and hands-on labs, gaining both theoretical knowledge and practical experience in cybersecurity techniques. The C programming assignments helped sharpen my coding skills and allowed me to build a foundation that directly supports cybersecurity operations.
Programming Assignments:
Hexadecimal to Integer Conversion (htoi): This assignment reinforced my understanding of data conversion techniques, which are vital in tasks like malware analysis.
String Manipulation with Pointers: By writing functions that manipulated strings and evaluated expressions, I gained a deeper understanding of how C programming is used to manage data within cybersecurity operations.
File Comparison Program: This assignment involved developing a tool to compare files, which can be applied in cybersecurity investigations, for tasks such as identifying discrepancies in system files after an attack.
These programming exercises helped me strengthen my ability to analyze and write efficient code, essential for performing tasks like protocol stack creation or malware analysis.
Hands-On Labs:
Traffic Tracing Using Wireshark and TCPdump: In this lab, I learned to monitor and trace network traffic, which is crucial for identifying network anomalies and potential intrusions.
Firewall Configuration with pfSense: This exercise enabled me to configure firewall rules and policies to secure a network, applying defense strategies in real-world scenarios.
Penetration Testing on Windows: By conducting a penetration test on a Windows system, I learned to identify vulnerabilities and exploit them, which is critical for strengthening system defenses.
Password Cracking and Information Hiding: These labs demonstrated common attack methods and defensive techniques, reinforcing my understanding of how to secure sensitive information.
Future Application
The skills I acquired in this course will directly benefit my future work in cybersecurity. The C programming knowledge equips me to work on projects involving malware analysis and system vulnerability assessments, while the network analysis and penetration testing techniques will be essential in securing complex infrastructures. I look forward to applying these skills in real-world scenarios to safeguard networks and systems against cyber threats.