Objective 1: Create a network infrastructure design communications document that includes identified hardware components, connections to outside world, identified physical layer connectivity (media) and addressing, including operational and security components in the design.
Project #1: Assignment 2.1- Network Upgrades (NTW102): This project meets the objective since Visio was used in order to design a network diagram that details a network enterprise infrastructure. The network diagram contained both physical and logical components such as IP addresses/subnets (i.e. logical) and Routers/Firewalls (i.e. physical).
Project #1: Assignment 2.1- Network Upgrades (NTW102): This project meets the objective since Visio was used in order to design a network diagram that details a network enterprise infrastructure. The network diagram contained both physical and logical components such as IP addresses/subnets (i.e. logical) and Routers/Firewalls (i.e. physical).
Assignment 2.1 Network Upgrades NTW102 | |
File Size: | 131 kb |
File Type: |
Objective 1: Create a network infrastructure design communications document that includes identified hardware components, connections to outside world, identified physical layer connectivity (media) and addressing, including operational and security components in the design.
Project #2: Assignment 3.1: VoIP Upgrades (NTW102): This project meets the objective since Visio was used to create a network diagram which details a network enterprise infrastructure related to a Voice over IP (i.e. VoIP) phone system. Physical components of the network diagram included phones, servers, and cabling. Logical components of the network diagram included IP addresses of the major devices for example.
Project #2: Assignment 3.1: VoIP Upgrades (NTW102): This project meets the objective since Visio was used to create a network diagram which details a network enterprise infrastructure related to a Voice over IP (i.e. VoIP) phone system. Physical components of the network diagram included phones, servers, and cabling. Logical components of the network diagram included IP addresses of the major devices for example.
Assignment 3.1: VoIP Upgrades Network Diagram NTW102 | |
File Size: | 45 kb |
File Type: |
Objective 1, Project #3: Assignment 4.2- IDS/IPS, VPN and VLAN Upgrades (NTW102)- This project meets the objective since Visio was used to create a network diagram which details an Intrusion Detection/Intrusion Prevention System (i.e. IDS/IPS) with firewalls and and a VPN (Virtual Private Network) included in the diagram. Lastly, a VLAN is also included in the diagram as well.
Assignment 4.2 IDS/IPS, VPN and VLAN Network Diagram | |
File Size: | 119 kb |
File Type: |
Objective 2: Install, configure and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection systems, intrusion detection systems, firewalls, system hardening, anti-virus tools, patch management, auditing and assessment.
Project #1: System Hardening (NTS103)- This project meets the objective since it is an example of system hardening which is known as the process of removing unimportant accounts/applications, turning off any system settings which are not essential, turning on a firewall, or turning on encryption for instance. This project also includes supporting documentation of system hardening examples done on a Windows machine.
Project #1: System Hardening (NTS103)- This project meets the objective since it is an example of system hardening which is known as the process of removing unimportant accounts/applications, turning off any system settings which are not essential, turning on a firewall, or turning on encryption for instance. This project also includes supporting documentation of system hardening examples done on a Windows machine.
System Hardening NTS103 | |
File Size: | 1032 kb |
File Type: |
Objective 2: Install, configure and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection systems, intrusion detection systems, firewalls, system hardening, anti-virus tools, patch management, auditing and assessment.
Project #2: Project 01- Pentest Lab Setup (NTS350)- This project meets the objective since it involves installing/setup of a security software/penetration testing tool called Kali Linux onto a virtual machine with supporting documentation/screenshots of testing basic commands in Kali Linux as well.
Project #2: Project 01- Pentest Lab Setup (NTS350)- This project meets the objective since it involves installing/setup of a security software/penetration testing tool called Kali Linux onto a virtual machine with supporting documentation/screenshots of testing basic commands in Kali Linux as well.
Kali Linux Assignment NTS350 | |
File Size: | 807 kb |
File Type: |
Objective 3: Construct, implement and document a script or a program to automate a security related process or other tasks such as installation, administration, management, mapping resources, logon scripts, patch management, updates, auditing, analysis and assessment
Project #1: Project 1.3-NMAP Script (NTS370)- This project meets the objective since it is an automated script which relates to NMAP which is a network mapping resource tool that runs an NMAP scan on a certain IP range while sending the start and ending IP address to a certain text file. There are two options as well which include a regular and an operating system scan.
Project #1: Project 1.3-NMAP Script (NTS370)- This project meets the objective since it is an automated script which relates to NMAP which is a network mapping resource tool that runs an NMAP scan on a certain IP range while sending the start and ending IP address to a certain text file. There are two options as well which include a regular and an operating system scan.
NMAP Script NTS370 | |
File Size: | 285 kb |
File Type: | png |
Objective 3: Construct, implement and document a script or a program to automate a security related process or other tasks such as installation, administration, management, mapping resources, logon scripts, patch management, updates, auditing, analysis and assessment
Project #2: Project 2.2- File Dump Program (NTS370)- This project meets the objective since it is in automated script which asks the user for a certain file name and then displays the content of the same file on the screen when running the same script. This program can also be used for audit files which are certain XML text files which consist of the specific configuration and file permissions of a certain operating system.
Project #2: Project 2.2- File Dump Program (NTS370)- This project meets the objective since it is in automated script which asks the user for a certain file name and then displays the content of the same file on the screen when running the same script. This program can also be used for audit files which are certain XML text files which consist of the specific configuration and file permissions of a certain operating system.
File Dump Script NTS370 | |
File Size: | 217 kb |
File Type: | png |
Objective 4: Create a policy or procedure that addresses events such as: a disaster recovery plan, a business continuity plan, an incident response policy, an acceptable usage document, an information security policy, a physical security policy, assessments or troubleshooting procedures.
Project #1: Incident Response Final Project (NTS405)- This project meets the objective since it is similar to an incident response policy. The 3 page project contains a scenario, possible events that may occur as a result of the scenario created in the project, and possible steps to resolve the scenario described in the project. For the purposes of my final project, I created my own imaginary gaming company called "GamersGeeks" and created a possible scenario that may occur in the real world related to the topic of incident response while demonstrating how to resolve the event as well.
Project #1: Incident Response Final Project (NTS405)- This project meets the objective since it is similar to an incident response policy. The 3 page project contains a scenario, possible events that may occur as a result of the scenario created in the project, and possible steps to resolve the scenario described in the project. For the purposes of my final project, I created my own imaginary gaming company called "GamersGeeks" and created a possible scenario that may occur in the real world related to the topic of incident response while demonstrating how to resolve the event as well.
Incident Response Final Project NTS405 | |
File Size: | 123 kb |
File Type: |
Objective 4: Create a policy or procedure that addresses events such as: a disaster recovery plan, a business continuity plan, an incident response policy, an acceptable usage document, an information security policy, a physical security policy, assessments or troubleshooting procedures.
Project #2: Policy Design PowerPoint Presentation (NTS415)- This project meets the objective since in the PowerPoint, I described three total policies which related to both physical and information security. In my PowerPoint, I describe my imaginary company for the purposes of the PowerPoint while including the risks and the assets that are to be protected by the three policies described in my assignment.
Project #2: Policy Design PowerPoint Presentation (NTS415)- This project meets the objective since in the PowerPoint, I described three total policies which related to both physical and information security. In my PowerPoint, I describe my imaginary company for the purposes of the PowerPoint while including the risks and the assets that are to be protected by the three policies described in my assignment.
Policy Design PowerPoint | |
File Size: | 1300 kb |
File Type: |
Objective 5: Develop a research report or implementation plan concerning legal and ethical best practices and mandated requirements that pertain to information security.
Project #1: Assignment 03-1 (NTS201): This project meets the objective since a research report was developed in terms of ethical best practices related to network security. In this case, I described in detail three security controls which are currently used in current data centers or organizations that relate to my field by providing a summary of each, how it would be implemented typically in a real world setting, and research about each control as well. My three controls mentioned in my paper included risk analysis, firewalls, and antivirus software.
Project #1: Assignment 03-1 (NTS201): This project meets the objective since a research report was developed in terms of ethical best practices related to network security. In this case, I described in detail three security controls which are currently used in current data centers or organizations that relate to my field by providing a summary of each, how it would be implemented typically in a real world setting, and research about each control as well. My three controls mentioned in my paper included risk analysis, firewalls, and antivirus software.
Assignment 03-1 NTS201 | |
File Size: | 290 kb |
File Type: |
Objective 5: Develop a research report or implementation plan concerning legal and ethical best practices and mandated requirements that pertain to information security.
Project #2: Assignment: 12 Principles of Information Security (NTS201)- In this paper, I summarize the twelve main concepts relating to Information security that includes a real world example of how I would implement each of the twelve information security concepts within a network security related organization. In other words, this paper is similar to a research report on twelve best practices when it comes to information security.
Project #2: Assignment: 12 Principles of Information Security (NTS201)- In this paper, I summarize the twelve main concepts relating to Information security that includes a real world example of how I would implement each of the twelve information security concepts within a network security related organization. In other words, this paper is similar to a research report on twelve best practices when it comes to information security.
Principles of Information Security Assignment | |
File Size: | 97 kb |
File Type: |
Objective 6: Research, document, test and evaluate several current industry information security based threats, risks, malicious activities, covert methodology, encryption technologies, mitigation techniques or unconventional tactics to prevent loss of sensitive information and data confidentiality, integrity and availability.
Project #1: Malware Removal Lab (NTS103)- This paper meets the objective since mitigation techniques were both documented and tested in a hands-on malware removal lab. The malware removal lab allowed me to have hands-on practice with detecting and removing certain malware on a Windows virtual machine.
Project #1: Malware Removal Lab (NTS103)- This paper meets the objective since mitigation techniques were both documented and tested in a hands-on malware removal lab. The malware removal lab allowed me to have hands-on practice with detecting and removing certain malware on a Windows virtual machine.
Malware Removal Lab NTS103 | |
File Size: | 870 kb |
File Type: |
Objective 6: Research, document, test and evaluate several current industry information security based threats, risks, malicious activities, covert methodology, encryption technologies, mitigation techniques or unconventional tactics to prevent loss of sensitive information and data confidentiality, integrity and availability.
Project #2: Password Manager Lab (NTS103)- The assignment meets the objective since it involves hands-on practice with a form of encryption technology. In this case, the type of encryption technology includes two different password managers used for the purposes of this assignment (i.e. Bitwarden and LastPass), The paper included screenshots of installing both password managers, configuring two factor authentication, and documenting features of each password manager as well. Also, this helps prevent loss of sensitive information/protects data which is the entire reason for a password manager being present on a device.
Project #2: Password Manager Lab (NTS103)- The assignment meets the objective since it involves hands-on practice with a form of encryption technology. In this case, the type of encryption technology includes two different password managers used for the purposes of this assignment (i.e. Bitwarden and LastPass), The paper included screenshots of installing both password managers, configuring two factor authentication, and documenting features of each password manager as well. Also, this helps prevent loss of sensitive information/protects data which is the entire reason for a password manager being present on a device.
Password Manager Lab | |
File Size: | 821 kb |
File Type: |