Report 2 7
REPORT # 2
Name: Mohammad Ghori
Course number:BA63270G120
Student ID:
1. Courses I Am Taking This Term – Describe the eight-week online course (course #,
course title, & course description)
I am enrolled in in BA63270G120 Cyber Security eight hour online course.Industry characterizes Cyber
Security as the practice of protecting systems, networks, and programs from digital attacks. This
course explores the current body of knowledge, skills, techniques, and tools used to recognize and
mitigate Cyber Security Attack
2. List Outcomes from Your Eight-Week Course – List the outcomes (objectives) as
written in the course syllabus from the eight-week online course.
•
•
•
•
•
•
•
•
Objectives of Cyber Security Course include learning
domain and network layers of the OSI model
intrusion detection system (IDS) systems used to monitor network traffic for suspicious
activity and issues alerts when such activity is discovered
intrusion prevention systems (IPS) which operates much line IDS but adds a layer of security
to reject (or nullify) the potentially malicious activity
Honeypots – used to attract harmful activities in order to understand the mechanisms used
malicious software
software vulnerabilities
cryptography – the practice and study of techniques for secure communication in the
presence of third parties called adversaries
encryption and decryption techniques used to secure data and limit the potential for data
breaches
3. Apply Your Work Experiences to The Course – Correlate your job responsibilities
with the eight-week online course outcomes listed above.
I am currently working as a software developer. Cybersecurity addresses the key aspects
confidentiality, authentication, integrity, and availability.As part of my job responsibilities to
create applications using java programming language and i have learnt to use encryption,
hash functions, message digests, digital signatures, and digital certificates from cyber security
and use it in my coding for security purpose.I am involved creating aws architecture for for
hosting applications.After this course i have more knowledge in using encryption, digital
certificates and signatures in my applications for security purpose to prevent my applications
from intruders.I am involved in developing applications in java programming language and it
is necessary to learn about java security. Java security includes a large set of APIs, tools, and
implementations of commonly-used security algorithms, mechanisms, and protocols. The
Java security APIs span a wide range of areas, including cryptography, public key
infrastructure, secure communication, authentication, and access control. Java security
technology provides the developer with a comprehensive security framework for writing
applications, and also provides the user or administrator with a set of tools to securely
manage applications.security protocols and creating virtual private clouds and subnets and
regions are main vital specifications need to be done while creating AWS architecture for
hosting applications.
Eight-week online course outcomes and correlation of job to the course (total 250 words)
…