Here are my projects for my degree objectives. There are diagrams, reports, and scripts.
|
Here is a network diagram I made of an example of a corporate network. This fulfills my first degree objective which is to "Create a network infrastructure design communications document that includes identified hardware components, connections to outside world, identified physical layer connectivity (media) and addressing, including operational and security components in the design." This diagram includes hardware, connections to the outside world, physical devices, IP addressing, and security measures such as VPNS and VLANs.
Here is another network diagram. This also fulfills my first degree objective because it includes security, IP addressing, connections to the outside world, and physical devices and hardware.
Here is a report I wrote on the features of Capsa versus Security Onion. This fulfills my second degree objective which is to "Install, configure, and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection systems, intrusion detection systems, firewalls, system hardening, anti-virus tools, patch management, auditing, and assessment." I installed, configured, and tested Capsa and Security Onion for this objective. In the report I compared and contrasted their features.
Here is a report I wrote that also fulfills my second degree objective. I captured data with Wireshark and analyzed it.
Here is another report I wrote that fulfills my second degree objective. I used security tools to investigate Windows 10 for this assignment.
Here is a script I wrote for my third objective which is to "Construct, implement, and document a script or a program to automate a security-related process or other tasks such as installation, administration, management, mapping resources, logon scripts, patch management, updates, auditing, analysis, and assessment." The script uses PowerShell, Bash, and Python. The Bash script helps with system administration and the Python script generates fake data for security purposes.
Here is a Bash script I wrote that fulfills my third objective. It lets the user scan an IP address on the local network using Nmap.
Here is a Business Continuity and Disaster Recovery Plan that I wrote with a team for my fourth objective which is to "Create a policy or procedure that addresses events such as: a disaster recovery plan, a business continuity plan, an incident response policy, an acceptable usage document, an information security policy, a physical security policy, assessments, or troubleshooting procedures."
Here are injects that I wrote for CCDC that also fulfill my fourth degree objective.
Here is a report I wrote on The Health Information Technology for Economic and Clinical Health Act. This fulfills my fifth degree objective which is to "Develop a research report or implementation plan concerning legal and ethical best practices and mandated requirements that pertain to information security." For this report I researched HITECH which expands on security and privacy rules in HIPAA.
Here is another report I wrote for my fifth objective. It's about the OCTAVE security framework, which is a framework that helps companies evaluate their important assets.
Here is another report I wrote for my fifth objective. It's about ISO/IEC 19086-1:2016, a Cloud Service Level Agreement Framework that helps companies with their SLAs for cloud services.
Here is a report I wrote on how I would respond to a ransomware attack for my sixth objective which is to "Research, document, test, and evaluate several current industry information security based threats, risks, malicious activities, covert methodology, encryption technologies, mitigation techniques, or unconventional tactics to prevent loss of sensitive information and data confidentiality, integrity, and availability." This fulfills the objective because I researched a malicious activity and wrote about how I would respond to it.
Here is a report I wrote on APT32 for my sixth objective. It fulfills the objective because I researched and analyzed a threat.
Here is a report I wrote on APT29 for my sixth objective. It fulfills the objective because I analyzed and researched a current cyber threat.
Here is a report I wrote on APT1 for my sixth objective. I researched and documented details of a current cyber threat.