Toggle navigation
SY110 - Introduction to Cybersecurity
Select →
Options
Print
Class
1 - Intro to the Cyberspace Domain
2 - File Systems and Hierarchies
3 - Computer Architecture
4 - Operating System Shells and Permissions
5 - Numeral Systems in Computing
6 - Intro to the World-Wide-Web and HTML
7 - Intro to the Web: JavaScript
8 - Intro to the Web: Client-Side Scripting
9 - Intro to the Web: Server-Side Scripting
10 - Intro to Cryptography and Symmetric Encryption
11 - Asymmetric Encryption
12 - Digital Signatures and Digital Certificates
13 - Stack: Intro and Application
14 - Stack: Transport
15 - Stack: Network
16 - Stack: Data Link
17 - Stack: Physical Layer
18 - Human Factors in Cybersecurity
19 - Law, Policy, and Ethics
20 - Vulnerabilities and Malware
21 - Network Security Architectures
22 - Passive and Active Reconnaissance
23 - Risk Management and Assessments
24 - Vulnerability Management and Incident Response
25 - Cyber Threat Intel and Modeling
26 - Digital Forensics
27 - Emerging Cyber Threats: Artificial Intelligence
Lab
1 - Computer Architecture
2 - Linux and Windows Operating Systems
3 - Build a Website
4 - Cross-Site Scripting
5 - Hashing, Passwords, and Authentication
6 - Network Traffic Analysis
7 - Build a Network
8 - Securing Networks
9 - Cyber Recon
10 - Computer Network Attack
11 - Computer Network Defense
Exam
1 - Six Week Exam
2 - Twelve Week Exam
3 - Final Exam
Demos and Tables
Binary-Decimal-Hex Converter
Hex Conversion Table
ASCII Table
File Headers
JavaScript Cheat Sheet
JavaScript Interpreter
Javascript Batch Interpreter
HTML Element Highlighter
Network Demos
IP Address Converter
Network Address Calculator
Interactive Firewall
Services, Ports, and Protocols
Caesar Shift Cipher
Vigenere Cipher
AES
- tools for using AES
RSA
- generate keys, encrypt/decrypt
Substitution CipherSolver
Windows to Linux Dictionary
SY110 Miscellaneous (.msi file)
SY110 PATH Environment Variables
Forensics
SY110 Glossary
SY110 Glossary