Objectives.These are the objectives for my Network Security degree.
|
Objective #1
Create a network infrastructure design communications document that includes identified hardware components, connections to outside world, identified physical layer connectivity (media) and addressing, including operational and security components in the design.
This assignment was to create a network diagram using certain criteria. This assignment meets the first objective because each component is identified and addressed properly in a way that reflects that of real world network diagrams.
|
This assignment was to create an INFOSEC implementation plan following the students choice of framework. This assignment meets the first objective because each component is identified and addressed properly in a way that reflects that of real world network diagrams.
|
Objective #2
Install, configure and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection systems, intrusion detection systems, firewalls, system hardening, anti-virus tools, patch management, auditing and assessment.
This assignment was to create a windows server/client system to operate a business. This assignment completes the second objective because we installed various active directory/group policy rules for system hardening, patch management, auditing, and assessment.
|
This assignment was to install/use Nmap to find and scan a vulnerable machine on the network. This assignment completes the second objective because it shows that I was successfully able to use Nmap to find the machine and to scan which ports were open/vulnerable.
|
Objective #3
Construct, implement and document a script or a program to automate a security-related process or other tasks such as installation, administration, management, mapping resources, logon scripts, patch management, updates, auditing, analysis and assessment.
This assignment was to create an automated task within the windows environment. This assignment meets objective three because it automatically ran the NETSTAT command and saved the results into a txt file for future viewing to confirm all connections on the machine.
|
This is my SIP project. This project meets objective three because it allows a user to submit an email to the program, then the program searches for all links within the email, parses them, and allows the user to submit the to VirusTotal for further investigation.
|
Objective #4
Create a policy or procedure that addresses events such as: a disaster recovery plan, a business continuity plan, an incident response policy, an acceptable usage document, an information security policy, a physical security policy, assessments or troubleshooting procedures.
This assignment was to create a fake company and to create a risk assessment based off of this company. This assignment meets objective four because it addresses phishing, and establishes phishing campaigns run by the company to train users to see what phishing emails really look like in simulated phishing emails.
|
This assignment was to create a security control plan for another fake company modeling what most data centers would do. This assignment meets objective four because it goes in depth in several topics including legal, ethical and professional issues, along with an incident response and business continuity and disaster recovery plan.
|
Objective #5
Develop a research report or implementation plan concerning legal and ethical best practices and mandated requirements that pertain to information security.
This assignment was created to model the 12 principles of Information Security. This assignment meets objective five because it goes in depth through all 12 principles based on the textbook "Information Security: Principles and Practices" by Mark Merkow and Jim Breithaupt
|
This assignment was to create a security control plan for another fake company modeling what most data centers would do. This assignment meets objective five because it goes in depth in several topics including legal, ethical and professional issues, along with an incident response and business continuity and disaster recovery plan.
|
Objective #6
Research, document, test and evaluate several current industry information security based threats, risks, malicious activities, covert methodology, encryption technologies, mitigation techniques or unconventional tactics to prevent loss of sensitive information and data confidentiality, integrity and availability
This assignment was to research a cybersecurity incident/crime. This assignments meets objective six because it establishes an ethical delema based on a new pacemaker that sent all data back to a doctor review, but it was used to rule against the user with the pacemaker.
|
This assignment was to research an exploit. This assignment meets objective sic because it is research over the EternalBlue exploit which is major flaw in windows systems that allow for remote access control very easily.
|