top of page

Introduction to Cybersecurity

CYSE 300

CYSE 300 provided an overview of the field of cybersecurity. It covers core cybersecurity topics including computer system architectures, critical infrastructures, cyber threats and vulnerabilities, cryptography, information assurance, network security, and risk assessment and management. Students were expected to become familiar with fundamental security concepts, technologies, and practices. This course provides a foundation for further study in cybersecurity.

​

The course objectives are:

  • Identify and prioritize information assets;

  • Identify and prioritize threats to information assets;

  • Define an information security strategy and architecture;

  • Plan for and respond to intruders in an information system;

  • Describe legal and public relations implications of security and privacy issues; and

  • Present a disaster recovery plan for the recovery of information assets after an incident.

 

​

Typing on a Computer

Final Research Paper

The Horror of Identity Theft 

The paper focuses on the biggest problem that the United States is facing, Identity Theft, which cases have been going up since there are many malicious people in cyberspace. The paper gives an example of a case where a woman faced so many years to recover financially from the person who stole her identity very easily.

 

The paper focuses on how much damage it causes and the long journey to recover from it. Also, it gives a reason why many people should know the proper steps to avoid identity theft and to not become a victim. 

CYSE 300 Labs

Lab 1: Performing Reconnaissance and Probing Using Common Tools

Used Wireshark to capture and analyze network traffic, use Nessus to scan the network, review a sample collection of data using NetWitness Investigator, connect to a remote Windows machine, and explore two file transfer applications, FileZilla and Tftpd64. Also, used PuTTY to connect to a Linux machine and run several Cisco commands to display statistics for the network interfaces. Finally, used Zenmap to perform a scan of the network and create a network topology chart.

​

Overall, I learned to:

1. Explore common network scanning and analysis tools

2. Perform network reconnaissance and probing on the machines in the Virtual Security Cloud Lab (VSCL)

3. Use Zenmap to perform an Intense scan on an entire subnetwork (172.30.0.0/24)

4. Create a Fisheye Bubble chart to explain the relationships between devices on a network

5. Explain how attackers use common network scanning and analysis tools to compromise networks

Section 1

S1.ArrivalTime Wireshark

S1.ArrivalTime Wireshark

The Arrival Time for the Wireshark ICMP traffic

S1. Attachment NetWitness Demo

S1. Attachment NetWitness Demo

The filename of the attachment in the NetWitness Investigator Demo Collection.

S1. FishEye Chart Zenmap

S1. FishEye Chart Zenmap

A Fisheye Bubble chart from Zenmap scan.

Section 2

S2. Arrival Time Wireshark

S2. Arrival Time Wireshark

The Arrival Time for the Wireshark ICMP traffic

S2. Fisheye Zenmap

S2. Fisheye Zenmap

A Fisheye Bubble chart from Zenmap scan.

S2. NetWitness file details

S2. NetWitness file details

The file details of the creditcards.txt attachment in the NetWitness Investigator.

S2. TFTP File transfer

S2. TFTP File transfer

The successful TFTP file transfer.

S2. Zenmap scan results

S2. Zenmap scan results

The results of the second Zenmap scan.

bottom of page