CYSE 301

Cybersecurity Techniques and Operations

Cybersecurity Techniques and Operations, CYSE 301, encapsulates much of the tools and practices that would be used by cybersecurity professionals. This class provided a virtual environment, almost like a playground, to use kali linux to use real-world operations and concepts via hands-on learning. This allowed for students to learn about the rules and laws involved with cyber operations, how to evaluate vulnerabilities of networks, and what countermeasures can be used to protect the network from attacks. All of these practices help to manage data in a secure manner and ultimately helps understand what can be done in the professional field.

The image above may look normal, but during this class, you learn how to encrypt and embed information into images using steganography which is very interesting because it can provide ideas on how information can be transmitted secretly. Through this class you get to learn how to use the appropriate tools to encrypt/decrypt situations just like this one, and the concept and practice is truly satisfying when all of the pieces are put into place and working as intended.


Other works

These are some other works that were completed in the course that present the commands and practices we were able to perform within the Linux VM. These ideas allowed us to use offensive and defensive procedures and showed students how password cracking can be performed using these systems. All of the assignments provide insight into the tools and how they are used. This class gives a multitude of knowledge and skill with how cybersecurity operates in the real world.