Your cart is currently empty!
Fundamentals of Information Security

Throughout this course we learned how to encrypt text file, using networking tools and scan for vulnerabilities on Linux systems.




Also during this course we had to make a bring your own device policy. Here is an attachment of mine.
BYOD-Security-Policy-JMDownload
Career skills
Career Skills 1: Learning how to use nano to create a text file.
Career Skills 2: Learning that it creates a new text file that’s encrypted using the gpg –C command.
Career Skills 3: Learning how to effectively use NMAP.
Career skills 4: Using multiple forms of authentication.
Career Skill 5: using NMAP to search for any ports that don’t need to be open.
Career skill 6: Making use of Wireshark.
Challenges
Challenge 1: Having to understand the applying of the encryption.
Challenge 2: Having to understand how to remove the encryption.
Challenge 3: Setting up google authenticator
Challenge 4: using a different network management utilitly.
Challenge 5: Using other software to manage the network.