Artifact 1: Wireshark Packet Capture and Analysis

  • Artifact Description: A lab exercise capturing and analyzing network traffic using Wireshark. Tasks involved applying ICMP and DNS filters and interpreting packet-level data.
  • Skills Demonstrated:
    • Mastery of packet analysis for identifying network anomalies.
    • Application of filtering techniques for efficient data interpretation.
    • Understanding network communication protocols.
  • Relevance to Career Goals: Demonstrates hands-on experience with a critical tool for network monitoring and forensic analysis.

Artifact 2: Network Scanning with Nmap/Zenmap

  • Artifact Description: A report on network scanning activities performed using Nmap and its GUI counterpart Zenmap to identify vulnerabilities and open ports.
  • Skills Demonstrated:
    • Conducting vulnerability assessments using advanced scanning techniques.
    • Mapping network structures to detect potential threats.
    • Translating technical findings into actionable recommendations.
  • Relevance to Career Goals: Highlights my ability to perform penetration testing and risk assessments.

Artifact 3: Firewall Configuration in pfSense

  • Artifact Description: A configuration guide demonstrating the setup of firewall rules in pfSense to secure virtual machine communication.
  • Skills Demonstrated:
    • Implementing and testing firewall rules to enforce security policies.
    • Configuring interfaces, NAT, and other pfSense features.
    • Troubleshooting configuration issues to ensure operational effectiveness.
  • Relevance to Career Goals: Showcases expertise in network security and policy enforcement, crucial for system administrator or network engineer roles.