Cybersecurity Operations and Techniques

This page contains much of my work in Cyber Operations and Techniques. I have taken multiple courses on this subject matter and it is one of my greatest strengths!

CYSE 301 – Cyber Operations and Techniques

Firewall configuration and Network scanning activities

Assignment-3-Sword-vs-compressed

Steganography

“Assignment Task:

  1. Create a text file containing the answers to the following questions:
  • What are your name and current date and timestamp?
  • What is your expected grade in this course?
  1. Use steghide to hide this text file in the cover image, ” monarch.bmp.”
  • Use your own UIN as the password for encryption, for example, 01000123.
  • Use your Midas ID (all lowercase) as the name of the STEGO file, for example
    (“pjian123.bmp”).

VPN Server Configuration

“Assignment directions:

  1. Create a Linux Instance on GCP named vpn-301-YourMIDAS (show the IP address and region assigned for the VM). 
  2. Configure the server and generate a client named “yourMidas_vpn.ovpn” and download it from the server. 
  3. Connect to your VPN server from a laptop or cell phone client and show the public IP address returned from the website “What is My IP address
CYSE-301-VPN-Server

CYSE 601 – Advanced Cyber Operations and Techniques

Kali Linux Tools and Operations

Tasks:

  1. Screenshots of the Linux command line showing the executed commands and their outputs.
  2. Screenshots of the IP address acquisition on each VM and the Nmap scan results.
  3. Descriptions and usage examples/screenshots for the three Kali Linux tools explored.
CYSE-601-Lab-1

Firewall Configuration

CYSE-601-PFSENSE-LAB

SNORT

CYSE-601-SNORT-Lab-Report-1

Wireshark

CYSE-601-Wireshark-Lab-Report-1