Network Security Degree Objectives
Degree Objectives#1
1. Create a network infrastructure design communication document that includes identified hardware components, connections to outside world, identified physical layer connectivity(media) and addressing.


The objective of this assignment was to create a network infrastructure with base requirements, then upgrade it with more features as the company grew. This also shows networking information, location information, Machine specifications, and quantities of machines.
Degree Objectives#2
2. Install,configure and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection system, intrusion detection system, firewall, system hardening, anti-virus tools, patch management, auditing and assessment


The document on the left describes what different security tools do in Security Onion. The document on the right includes information based on a class assignment related to computer security. It shows how to configured a computer to be more secure without using extra software.
Degree Objectives#3
3. Construct, implement and document a script or a program to automate a security-related process or other tasks such as installation, administration, management, mapping resources, logon scripts, patch management, updates, auditing, analysis and assessment


The document on the left is a script constructed to update your Linux using bash. The document on the right is a script that checks if the user is root/sudoed also using bash.
Degree Objectives#4
4. Create a policy or procedure that addresses events such as a disaster recovery plan, a business continuity plan, an incident response policy, an acceptable usage document, an information security, a physical security policy,
assessment or troubleshooting procedure


The document on the left Is a Business Continuity and Disaster Recovery plan that addresses the growing problem that businesses need to continually update their internal security plans. The document on the right is a PowerPoint that includes an incident response policy for a small business.
Degree Objectives#5
5. Develop a research report or implementation plan concerning legal and ethical best practices and mandated requirements that pertain to information security


The document on the left is a PowerPoint that went over the requirements and needs to implement the HIPPA Security Rule plan. The document on the right is a Power Point on creating security policies for a company.
Degree Objectives#6
6. Research, document, test and evaluate several current industry information security based threats, risks, malicious activity, covert methodology, encryption technologies, mitigation techniques or unconventional tactics to prevent
loss of sensitive information and data confidentiality, integrity, and availability.

