Journal Entry 05

Conduct security checks and monitoring network activity
Yielding data regarding the effectiveness of security training and policies
Building security protocols for an organization
Evacuating malicious code against a device/network
Running safety and security training programs
Selling firewall and security programs
Ethical hacking and penetration testing
Creating breach reports and data analysis
Utilizing firewall software and installing protocols in a device
Recovering missing or damaged data on a device/system
Improving ineffective security measures
Testing security measures
Yielding results from a data breach report, reworking the measures

Leave a Reply

Your email address will not be published. Required fields are marked *