top of page

Network Security Degree Objectives

Objectives: Text

Degree Objectives#1

1. Create a network infrastructure design communication document that includes identified hardware components, connections to outside world, identified physical layer connectivity(media) and addressing.

Objectives: Text
Objectives: Pro Gallery

The objective of this assignment was to create a network infrastructure with base requirements, then upgrade it with more features as the company grew. This also shows networking information, location information, Machine specifications, and quantities of machines.

Objectives: Text

Degree Objectives#2

2. Install,configure and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection system, intrusion detection system, firewall, system hardening, anti-virus tools, patch management, auditing and assessment

Objectives: Text
Objectives: Pro Gallery

The document on the left describes what different security tools do in Security Onion. The document on the right  includes information based on a class assignment related to computer security. It shows how to configured a computer to be more secure without using extra software.

Objectives: Text

Degree Objectives#3

3. Construct, implement and document a script or a program to automate a security-related process or other tasks such as installation, administration, management, mapping resources, logon scripts, patch management, updates, auditing, analysis and assessment

Objectives: Text
Objectives: Pro Gallery

The document on the left is a script constructed to update your Linux using bash. The document on the right is a script that checks if the user is root/sudoed also using bash.

Objectives: Text

Degree Objectives#4

4. Create a policy or procedure that addresses events such as a disaster recovery plan, a business continuity plan, an incident response policy, an acceptable usage document, an information security, a physical security policy,
assessment or troubleshooting procedure

Objectives: Text
Objectives: Pro Gallery

The document on the left Is a Business Continuity and Disaster Recovery plan that addresses the growing problem that businesses need to continually update their internal security plans. The document on the right is a PowerPoint that includes an incident response policy for a small business.

Objectives: Text

Degree Objectives#5

5. Develop a research report or implementation plan concerning legal and ethical best practices and mandated requirements that pertain to information security

Objectives: Text
Objectives: Pro Gallery

The document on the left is a PowerPoint that went over the requirements and needs to implement the HIPPA Security Rule plan. The document on the right is a Power Point on creating security policies for a company.

Objectives: Text

Degree Objectives#6

6. Research, document, test and evaluate several current industry information security based threats, risks, malicious activity, covert methodology, encryption technologies, mitigation techniques or unconventional tactics to prevent 
loss of sensitive information and data confidentiality, integrity, and availability.

Objectives: Text
Objectives: Pro Gallery

These two screenshots are examples of recent security events that I have made comments on in a Current Event discussion style posts.

Objectives: Text
bottom of page