Cybersecurity Fundamentals

Throughout my studies I have developed the skills required to have a strong foundation in Cybersecurity by engaging with a variety of courses that focus on both theoretical concepts and practical skills. These courses have provided me with the knowledge of cyberattacks, vulnerabilities, and the preventative measures that are used to protect against them. My courses also covered key cybersecurity concepts such as risk assessment, threat intelligence, and security protocols, which helped me better understand the tools, techniques, and strategies used by cybersecurity professionals.

Section 1:

For this assignment, I downloaded Wireshark and completed an exercise focused on capturing network packets. This assignment helped me understand packet analysis and its role in cybersecurity monitoring.

Section 2:

In this assignment, I identified and summarized the seven stages of the cyber kill chain. Additionally, I created a real-world scenario to demonstrate how a rootkit attack might actually occur.

Section 3:

This assignment was part of CYSE 450: Ethical Hacking and Penetration Testing. In this exercise I analyzed Mirai and VIPKeylogger malware samples and examined their characteristics. Using these characteristics I then identified the key differences between these two types of malware.