top of page

​
Cybersecurity Techniques and Operations

CYSE 301

​

CYSE 301 introduced the tools and techniques used to secure and analyze large computer networks and systems. Learned to systematically perform C programming in the first part of the course, which forms a foundation for many cybersecurity operations, such as malware analysis, and understanding network protocol stack, etc.

​

In the second part, explored and mapped networks using a variety of diagnostic software tools, learned advanced packet analysis, configured firewalls, wrote intrusion detection rules, performed a forensic investigation, and practiced techniques for penetration testing.

 

​

​

​

Computer Programming

Hands-on
Labs

1. Traffic tracing through Wireshark and TCPdump

1. Traffic tracing through Wireshark and TCPdump

2. Firewall configuration with pfSense

2. Firewall configuration with pfSense

3. Penetration test on Windows

3. Penetration test on Windows

4. Password cracking

4. Password cracking

5. Wireless Security

5. Wireless Security

Learning Outcomes

​

  • Understand the concepts and major constructs of the C programming language

  • Master the programming skills of the C programming language

  • Be able to analyze the C source code to infer the functionality of a given code segment, C function, C program, etc

  • Grasp the needed techniques and skills to write a C program in cybersecurity operations such as a network protocol stack

  • Monitor and analyze network traffic. Identify and trace the traffic when intrusion is detected in the network

  • Identify and evaluate the vulnerabilities in the network and implement effective countermeasures to protect the network

  • Master the technologies to exploit the vulnerabilities in a remote system

  • Analyze the vulnerabilities in the wireless communication network

  • Manage data and personal information in a secure manner

bottom of page