Austin's Education

New York University

Master of Science - MS, Cybersecurity
Jan 2024 - Dec 2026

NYU Tandon Bridge - Distinction Certificate

January 5th, 2024
Austin successfully completed the NYU Tandon Bridge program with distinction, a rigorous 28-week course encompassing key computer science topics.

Relevant Coursework

New York University

CS-GY 6843

Course Description:
This course takes a top-down approach to computer networking. After an overview of computer networks and the Internet, the course covers the application layer, transport layer, network layer and link layers. Topics at the application layer include client-server architectures, P2P architectures, DNS and HTTP and Web applications. Topics at the transport layer include multiplexing, connectionless transport and UDP, principles or reliable data transfer, connection-oriented transport and TCP and TCP congestion control. Topics at the network layer include forwarding, router architecture, the IP protocol and routing protocols including OSPF and BGP. Topics at the link layer include multiple-access protocols, ALOHA, CSMA/CD, Ethernet, CSMA/CA, wireless 802.11 networks and linklayer switches. The course includes simple quantitative delay and throughput modeling, socket programming and network application development and Ethereal labs.

CS-GY 6823

Course Description:
This course begins by covering attacks and threats in computer networks, including network mapping, port scanning, sniffing, DoS, DDoS, reflection attacks, attacks on DNS and leveraging P2P deployments for attacks. The course continues with cryptography topics most relevant to secure networking protocols. Topics covered are block ciphers, stream ciphers, public key cryptography, RSA, Diffie Hellman, certification authorities, digital signatures and message integrity. After surveying basic cryptographic techniques, the course examines several secure networking protocols, including PGP, SSL, IPsec and wireless security protocols. The course examines operational security, including firewalls and intrusion-detection systems. Students read recent research papers on network security and participate in an important lab component that includes packet sniffing, network mapping, firewalls, SSL and IPsec.

CS-GY 6813

Course Description:
This course introduces Information Systems Security and covers cryptography, capability and access control mechanisms, authentication models, security models, operating systems security, malicious code, security-policy formation and enforcement, vulnerability analysis, evaluating secure systems.

Bloomsburg University of Pennsylvania

Bachelor of Science - BS, Digital Forensics & Cybersecurity
May 2022

Clubs: Digital Forensics Club and Bloomsburg Cyber Defense Club (BCDC)

Competitions: National Cyber League (NCL) Fall 2021 and Spring 2022

Conferences: PFIC, OSDFCon, and BloomCON

Bloomsburg University's digital forensics program has earned the National Center of Academic Excellence in Cyber Defense Education (NCAE-CD) designation, sponsored jointly by the National Security Agency and the Department of Homeland Security.

Bloomsburg University students pursuing degrees in digital forensics and cybersecurity will:
- Analyze computers and cellphones
- Recover deleted photos, documents, and internet activity
- Investigate hidden regions of hard drives
- Monitor network traffic for flaws and compromises
- Evaluate the security of computer systems and networks
- Discover how to secure systems and data from hackers
- Respond to cyber breaches

Bloomsburg University is designated as a Pennsylvania Center for Digital Forensics and offers the only bachelor's degree in digital forensics and cybersecurity in the Pennsylvania State System of Higher Education.

NCAE-CD Designation

May 15th, 2022
Austin was presented with a certificate and cord from the Mathematical and Digital Sciences Department at the Bloomsburg University of Pennsylvania, which formally recognizes that Austin has completed the curriculum required to receive the National Center of Academic Excellence in Cyber Defense Education (NCAE-CD) designation.

Relevant Coursework

Bloomsburg University of Pennsylvania

DIGFOR 451

Course Description:
Investigates malware (malicious software) of Windows systems. The course includes the purposes and sources of malware, and emphasizes the discovery of malware on systems and the analysis of malware. Tools and techniques of malware analysis are used. Background information about programs, operating systems and memory use is provided as needed.

https://www.coursicle.com/bloomu/courses/DIGFOR/451/

DIGFOR 417

Course Description:
Performs advanced forensic methodology and simulated cases requiring imaging, chain of custody, analysis, report writing and testimony using a variety of windows tools and techniques.

https://www.coursicle.com/bloomu/courses/DIGFOR/417/

DIGFOR 371

Course Description:
Introduces the concepts, principles, and techniques associated with penetration testing. The course includes the basic processes of vulnerability assessments and penetration testing and emphasizes exploitation and security weaknesses. Tools and techniques of penetration testing are used. Background information about programs, wireless protocols, and password security is provided as needed.

https://www.coursicle.com/bloomu/courses/DIGFOR/371/

DIGFOR 351

Course Description:
Develops the knowledge and skills for the forensic acquisition and analysis of enterprise networks such as cloud computing environments and enterprise application appliances. The use of logging correlation and the impact of legal considerations in investigations is included.

https://www.coursicle.com/bloomu/courses/DIGFOR/351/

DIGFOR 318

Course Description:
Develops the knowledge and skills for the forensic acquisition and analysis of small devices such as cellular phones, smartphones, tablets, digital cameras, GPS devices and call detail records. Three hours lecture per week.

https://www.coursicle.com/bloomu/courses/DIGFOR/318/

DIGFOR 317

Course Description:
Examines various file systems and Windows operating system versions using industry standard software. A comprehensive study in imaging, analysis and reporting.

https://www.coursicle.com/bloomu/courses/DIGFOR/317/

DIGFOR 311

Course Description:
Develops the knowledge and skills necessary to identify the critical components of the major security domains including: network security; compliance and operational security; vulnerabilities and threats; application, data, and host security; cryptography; .and access control and identity management.

https://www.coursicle.com/bloomu/courses/DIGFOR/311/

DIGFOR 275

Course Description:
Presents a survey of computer network elements. Course focuses on low-level and applied concepts and issues. Local area networks are emphasized; internetworking issues such as routing are also covered. Hands-on activities include: packet sniffing and wire-level network traffic, constructing an Ethernet cable, and configuring a LAN.

https://www.coursicle.com/bloomu/courses/DIGFOR/275/

DIGFOR 257

Course Description:
Presents security elements as they apply to systems design, operating system installation and configuration, network hardware devices, and hardware reverse engineering. This is a comprehensive study in security design and implementation.

https://www.coursicle.com/bloomu/courses/DIGFOR/257/

DIGFOR 219

Course Description:
Introduces the Linux and related operating systems, emphasizing Linux commands, particularly those useful for digital forensics and security. Basic Linux file systems are examined.

https://www.coursicle.com/bloomu/courses/DIGFOR/219/

DIGFOR 122

Course Description:
Analyzes the NTFS file system in detail with an emphasis on forensic information from metadata, slack space, and unallocated space. Examination of various Windows artifacts using appropriate software.

https://www.coursicle.com/bloomu/courses/DIGFOR/122/

DIGFOR 121

Course Description:
Introduces basic computer forensic methodology. Analysis of File Allocation Table (FAT) file systems, particularly the FAT 32 file system with an emphasis on forensic information from metadata, slack space, and unallocated space. Examination of various Windows artifacts using appropriate software.

https://www.coursicle.com/bloomu/courses/DIGFOR/121/

© Copyright 2021-2024 Austin M. Sheppard - All Rights Reserved