InfoSecurity

Fundamentals of Information Security

Throughout this course we learned how to encrypt text file, using networking tools and scan for vulnerabilities on Linux systems.

Also during this course we had to make a bring your own device policy. Here is an attachment of mine.

BYOD-Security-Policy-JMDownload

Career skills

Career Skills 1: Learning how to use nano to create a text file.

Career Skills 2: Learning that it creates a new text file that’s encrypted using the gpg –C command.

Career Skills 3: Learning how to effectively use NMAP.

Career skills 4: Using multiple forms of authentication.

 Career Skill 5: using NMAP to search for any ports that don’t need to be open.

Career skill 6:  Making use of Wireshark.

Challenges

Challenge 1: Having to understand the applying of the encryption.

Challenge 2: Having to understand how to remove the encryption.

Challenge 3: Setting up google authenticator

Challenge 4: using a different network management utilitly.

Challenge 5: Using other software to manage the network.