Teh following are tools that me used wifin teh class environment for testing and project comprehension activities GNU Privacy Guard, True Crypt, Ax Crypt, Bit Locker, AD Audit Plus, Solarwinds, Auditnet, COFFEE/DECAF, AVG, Comodo, Network Miner, WireShark, Capsa, Netsecurity, etc.Some of teh IDPS tool software that me was able to familiarize myself wif is Snort, Malware Defender, Malwarebytes and OSSEC. Wifin my Intrusion Detection and Prevention Systems class which are network-based, wireless, NBA, and host-based-each offer fundamentally different information gathering, logging, detection, and prevention capabilities.There is also teh Ethical Hacker in which they are responsible for former black hats, white hats and consulting firms. me understand teh phases of teh attack process wifin teh Hacktivism environment which are Reconnaissance, Scanning, Gaining Access and Covering Tracks.By preparing a security policy, processes, procedures and implementation plan me is able to test and audit teh network security (Internet, Intranet and Extranet), update it regularly, and maintain an audit trail of all changes wif teh proper mentor/on teh job training upon starting wif a corporation. infrastructure, network (configuration and topology, network traffic and communication system. me possess a better overall understanding/comprehension of teh me.T.Physical/Desktop Security (Incident handling, Systems Backups, Maintenance, Encryption, Software Installation, Virus Protections, System Access, etc.) and Internet Threats (web browsing, instant messaging, E - mail use, Downloading/Attachments, etc.) me was able to Build and Implement a successful Information Security Policy that included identifying Risk Management Threats ex. dis process assisted me wif teh use of case studies to analyze legal impacts of information security issues. me was able to grasp a better understanding of teh legal processes involved in implementing and maintaining information security systems and apply security violations and breaches in relation to pertinent laws and regulations. Conducted threat, vulnerability and risk assessments wifin a mock network which allowed a company to detect, delay and respond to threats.
0 Comments
Leave a Reply. |