On this page, you will find several examples of my work related to cybersecurity. I have had classes in the topics of Database Security (CIS 483), Network Security (CIS 480), and Introduction to Information Security (CIS 481). With these classes, I have learned how to work with virtual machines of different Operating Systems and programs, such as Windows Server 2012, Linux, Kali, Wireshark, and more. The content I have learned is broadened regarding network, database and information security topics such as group policy, monitoring network traffic, identifying external & internal threats, and proper server firewall policies. I also have real-world experience with my current position as an IT administrator for over a year now, learning how group policy is applied in the workplace according to department and position requirements.
- Linux Firewall (CIS 480 – Network Security) – This assignment involved the use of Wireshark and Linux commands to find open ports and use iptables. An nmap scan was conducted, along with opening a new service port.
- Networking Utilities (CIS 480 – Network Security) – This assignment utilized a Kali virtual machine to conduct Linux commands. This included netstat, ifconfig, pinging a web address, using traceroute on a website, and more.
- Snort (CIS 480 – Network Security) – This assignment uses the snort tool in Linux, modifying local rules, and watch internet traffic. It also involves using another user’s terminal and running the snort tool.
- TCP/IP Attacks (CIS 480 – Network Security) – This assignment involves the execution of a SYN flood attack, RST attacks on telnet, and an nmap scan to determine open ports for the attack.
- Wireless Security (CIS 480 – Network Security) – Finally, this assignment is done using Kali in Linux to perform commands with Aircrack. It also involves the Wireshark program to identify details such as the TCP Checksum.
- Active Directory and Group Policy Objects (CIS 483 – Database Security) – This assignment involved creating an Active Directory on a SQL Server. It also included creating groups and applying group policy appropriately.
- Ownership Chaining (CIS 483 – Database Security) – This assignment utilized SQL Server on Windows Server 2012 to demonstrate ownership chaining on a few users. Queries are executed using different users and tables + policies are created to establish ownership.
- Pentesting (CIS 483 – Database Security) – This assignment uses the SQL Server on Windows Server 2012 to show different methods of pentesting on a server. This includes running commands through command shell, brute force attacking the server, and dumping the password hashes.
- PowerShell (CIS 483 – Database Security) – This assignment involves using PowerShell commands to learn basic functions, along with Command Prompt commands to find SID values on Windows and SQL Server.
- User Management (CIS 483 – Database Security) – Finally, this assignment is related to assigning database roles to users in the SQL Server. It also involves creating database roles that are applied appropriately to users.
- Backups (CIS 481 – Introduction to Information Security) – This assignment involved the use of a Linux virtual machine, called Labtainers. I used tar commands for several tasks, including backing up and verifying the data.
- Pass Crack (CIS 481 – Introduction to Information Security) – This lab was also conducted in Labtainers; I performed actions to crack password files in several different methods. Dictionary attacks are executed once the password files are cracked.
- Pubkey (CIS 481 – Introduction to Information Security) – Finally, this lab involved viewing public key certificates in Labtainers on Linux. I was tasked with pulling certificates for different websites and comparing public key algorithms, signature algorithms, and more.