This page contains much of my work in Cyber Operations and Techniques. I have taken multiple courses on this subject matter and it is one of my greatest strengths!
CYSE 301 – Cyber Operations and Techniques
Firewall configuration and Network scanning activities
Assignment-3-Sword-vs-compressedSteganography
“Assignment Task:
- Create a text file containing the answers to the following questions:
- What are your name and current date and timestamp?
- What is your expected grade in this course?
- Use steghide to hide this text file in the cover image, ” monarch.bmp.”
- Use your own UIN as the password for encryption, for example, 01000123.
- Use your Midas ID (all lowercase) as the name of the STEGO file, for example
(“pjian123.bmp”).
VPN Server Configuration
“Assignment directions:
- Create a Linux Instance on GCP named vpn-301-YourMIDAS (show the IP address and region assigned for the VM).
- Configure the server and generate a client named “yourMidas_vpn.ovpn” and download it from the server.
- Connect to your VPN server from a laptop or cell phone client and show the public IP address returned from the website “What is My IP address“
CYSE 601 – Advanced Cyber Operations and Techniques
Kali Linux Tools and Operations
Tasks:
- Screenshots of the Linux command line showing the executed commands and their outputs.
- Screenshots of the IP address acquisition on each VM and the Nmap scan results.
- Descriptions and usage examples/screenshots for the three Kali Linux tools explored.
Firewall Configuration
CYSE-601-PFSENSE-LABSNORT
CYSE-601-SNORT-Lab-Report-1Wireshark
CYSE-601-Wireshark-Lab-Report-1