Skills and Resources

Below are brief descriptions of the some of the key knowledge domains covered by the Cybersecurity Center and the Cybersecurity Concentration:

Cybersecurity has a number many core concepts that are used to provide context to the related technical subject matter. These concepts include the CIA Triad, Identity AAA, Risks, Vulnerabilities, Threats and Attacks. These core concepts help provide context to the technical subject matter in cyber.

Cryptography is the process of using a cipher algorithm to ensure the secrecy and integrity of information while in transit or at rest. Recommended topics include: 

    • Classical and Modern cryptography
    • Public Key Infrastructure
    • Hashing
    • Digital Signatures

To solve cyber challenge, students need a fundamental entry level understanding of data, operating systems, Linux, networks and software. Basic understanding of the following topics is recommended:     

  • Numbering Systems and Character encoding  
  • Data File Formats 
  • Software Concepts 
  • Linux Command Line

To investigate and solve cyber challenges, students need a good understanding of Network/Web concepts and have the ability to analyze network traffic. Network related topics include: 

  • Protocols and Addresses
  • Encryption
  • Internet / Web Connectivity 
  • Email, Wifi, Mobile 
  • Packet Analysis

Virtualization is the process of using shared hardware to host multiple software environments that can dedicate to specific users or purposes. Cloud services utilize virtualization to provide customers with private and public software environments hosted a remote location and accessible from the internet.

We recommend that students learn the basics of python for cyber data analytics and AI integration. In addition, students should become familiar with basic Linux scripting.

Course instruction will cover the converging cyber technologies of AI/ML and other emerging technologies. Students should focus on learning how to construct effective prompt requests to Large Language Model (LLM) AI chat services (e.g.,  ChatGPT, Bard, etc.)

Open Source Intelligence (OSINT) are skills used for reconnaissance and data gathering using publicly available information (i.e,, search engines, public repositories, social media, etc.) to gain in-depth knowledge on a topic or target. When conducting an OSINT exercise in preparation for a penetration test, the testers may want operate in a clandestine manner so not to disclose their presence.

Is an authorized simulated cyberattack on a computer system, performed to evaluate the security of the system. Steps can include reconnaissance, scanning, enumeration, password cracking, lateral movement, exploitation and reporting.

Vulnerability analysis is the process of using both external and internal information to identify system weaknesses and determining the associated risks. Incident Response is the process of responding to a cyber incident and recovering business operations.

Forensics is the art of preserving a computing environment in a safe mode and recovering a digital trail of evidence on the hardware, software, networks, and related devices. Forensics is most often associated with the investigation of cyber attacks and computer crimes.