Cybersecurity Pathway

In this course, students will learn the fundamental concepts, tools, and techniques that power modern cybersecurity operations. Students will explore real-world attacks and defenses, gaining hands-on experience with network monitoring, incident response, digital forensics, and security automation.

By the end of the program, students will understand how to detect, analyze, and respond to cyber threats — the same skills used daily by Security Operations Center (SOC) analysts and cybersecurity professionals.

The Software Development Pathway will cover the following topics:

Foundations of Cybersecurity

  • Core security principles and terminology
  • Understanding assets, vulnerabilities, and threats
  • Security frameworks and compliance (NIST, ISO 27001)
  • Networking fundamentals for security professionals

Threats, Attacks, and Defense

  • Phishing, malware, and social engineering
  • Endpoint and network hardening
  • Firewall configuration and defense-in-depth
  • Incident detection and containment

Incident Response and Forensics

  • Incident response lifecycle
  • Analyzing network traffic with Wireshark
  • Memory and disk forensics using Autopsy and Volatility
  • Writing technical and executive incident reports

Security Operations and Automation

  • STEM operations using ELK Stack
  • Log analysis and alert tuning
  • Vulnerability scanning with Nessus/OpenVAS
  • Python scripting for automation and log parsing

Advanced Topics

  • Ethical hacking and penetration testing fundamentals
  • Zero Trust architecture and network segmentation
  • Threat intelligence and OSINT (Shodan, Maltego)
  • Continuous monitoring and security policy development

Investigate a simulated ransomware attack on a fictional company. Students analyze PCAPs, logs, and forensic artifacts to identify the infection vector, scope, and impact. Deliverables include a full incident report and executive summary.

Network Defense Lab

Design and secure a small enterprise network using firewalls, hardening techniques, and vulnerability scans. Students demonstrate how to detect and mitigate attacks in real time.

SOC Dashboard and SIEM Analytics

Configure an ELK stack to collect and visualize security logs. Students build dashboards to monitor suspicious activity, detect brute-force attempts, and create alerts for potential intrusions.

Phishing Analysis and Awareness Campaign

Perform a phishing simulation, analyze results, and create an awareness plan for employees. This project combines social engineering analysis with practical defensive communication.