Degree Objective #1
Create a network infrastructure design communications document that includes identified hardware components, connections to the outside world, identified physical layer connectivity (media), and addressing, including operational and security components in the design.
I’ve created multiple diagrams in Visio showcasing what an enterprise network infrastructure would look like including different kinds of cabling, IP addresses, subnet masks, and various other network components. In addition there is documentation that highlights the contents of the diagram and how everything would be setup in an enterprise setting. |
Degree Objective #2
Install, configure and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection systems, intrusion detection systems, firewalls, system hardening, anti-virus tools, patch management, auditing, and assessment.
I have documentation about a recon assignment from my malware and exploits class that showcases my ability to use port scanners and vulnerability detection within the kali Linux suite. The assignment required me to recon on a large corporation so I did it on Tesla’s web servers. Some of the tools I used include Nmap, Tenable Nessus, recon-ng and Maltego. The second example I have is a tryhackme.com exercise called hackpark. Hackpark utilizes many tools and resources such as hydra, metasploit, wpeas, and exploit db. |
Degree Objective #3
Construct, implement and document a script or a program to automate a security-related process or other tasks such as installation, administration, management, mapping resources, logon scripts, patch management, updates, auditing, analysis, and assessment.
I created a script in bash for Nmap that’s basically a menu so I don’t have to remember all the Nmap commands for port, IP scanning and OS detection. The second script is a script named fizz buzz that's meant to be a challenge for scripting. The script should print numbers 1 -100 and print fizz next to any numbers divisible by 3 and buzz by any number divisible by 5. |
Degree Objective #4
Create a policy or procedure that addresses events such as: a disaster recovery plan, a business continuity plan, an incident response policy, an acceptable usage document, an information security policy, a physical security policy, assessments, or troubleshooting procedures.
The first document I provided includes a disaster recovery plan for a hypothetical situation I created in my incident response class. In addition I created a document for standard operating procedures in my Network infrastructure class that highlights the different parts of an enterprise, the responsibilities each employee has, and what to do incase of an incident/disaster. |
Degree Objective #5
Develop a research report or implementation plan concerning legal and ethical best practices and mandated requirements that pertain to information security.
I have written a paper about issues in technology that highlights legal and ethical issues with autonomous cars. Although the technology is innovative there are tons of downfalls that make autonomous vehicles dangerous. The second document I listed is a research paper written about computer crimes and tech giants companies refusing to release accounts linked to criminals. Both ethics and legal issues are mentioned in this paper and it highlights the way big enterprise view data privacy. |
Degree Objective #6
Research, document, test, and evaluate several current industry information security based threats, risks, malicious activities, covert methodology, encryption technologies, mitigation techniques, or unconventional tactics to prevent loss of sensitive information and data confidentiality, integrity and availability
I did an assignment where I tested a security based threat called eternal blue for my malware and exploits class. In addition my SIP project utilizes encryption methods which also covers this degree objective. The second assignment I have included is documentation regarding using and setting up up a honeypot. I set the honeypot up as a defensive mechanism to potentially catch an attacker and prevent the loss of sensitive information. |