Introduction to Cybersecurity

Graduate Course, UAIC, Faculty of Computer Science, 2023

Course Overview

This graduate-level course provides a comprehensive introduction to cybersecurity, covering fundamental principles, threat analysis, cryptographic techniques, network security, and ethical hacking methodologies.

Learning Objectives

  • Understand fundamental cybersecurity principles and threat landscapes
  • Master cryptographic techniques and their applications
  • Analyze network security protocols and vulnerabilities
  • Apply ethical hacking techniques for security assessment
  • Develop incident response and risk management strategies

Course Topics

Module 1: Fundamentals (Weeks 1-3)

  • Information security principles (CIA triad)
  • Threat modeling and risk assessment
  • Security frameworks and standards

Module 2: Cryptography (Weeks 4-6)

  • Symmetric and asymmetric cryptography
  • Hash functions and digital signatures
  • Public key infrastructure (PKI)

Module 3: Network Security (Weeks 7-9)

  • Network protocols and vulnerabilities
  • Firewalls and intrusion detection systems
  • VPNs and secure communications

Module 4: Ethical Hacking (Weeks 10-12)

  • Penetration testing methodologies
  • Vulnerability assessment tools
  • Social engineering techniques

Module 5: Incident Response (Weeks 13-14)

  • Digital forensics basics
  • Incident handling procedures
  • Recovery and business continuity

Required Materials

  • Textbook: “Security in Computing” by Pfleeger & Pfleeger
  • Software: Kali Linux, Wireshark, Metasploit
  • Hardware: Raspberry Pi for lab exercises

Assessment Structure

  • Lab Exercises: 35% (Weekly hands-on labs)
  • Midterm Exam: 25% (Theoretical concepts)
  • Final Project: 30% (Security assessment of a real system)
  • Participation: 10% (Class discussions and presentations)

Lab Environment

Students will work with a dedicated cybersecurity lab featuring:

  • Isolated network environment
  • Virtual machines with various operating systems
  • Professional security tools and software
  • Capture-the-flag (CTF) challenges

Prerequisites

  • Solid understanding of computer networks
  • Basic programming experience (Python preferred)
  • Familiarity with Linux command line

Resources

Contact Information

Email: bprelipcean_at_info.uaic.ro
Office Hours: Mondays 3:00-5:00 PM, Room 115
Lab Sessions: Fridays 2:00-4:00 PM, Cybersecurity Lab