Skip to content

Nick Carpenter

Nick Carpenter

  • About
  • Resume
  • Tech & Society
    • AI Ethics
    • CIA Triad Evaluation
    • SCADA Analysis
  • Case Studies
    • Business Failure Analysis
    • Data Breach Analysis
  • Labs
    • Firewall Configuration
    • Linux File Permissions Lab
    • Malware Analysis
    • Task Automation
    • User and Group Accounts Lab
  • Contact Information
    • Email and LinkedIn

Firewall Configuration

Every organization that is serious about protecting their data needs an individual who knows how to properly configure a firewall. Firewall configuration is the first line of defense in helping organizations monitor network traffic. Firewalls block or allow traffic based on a defined ruleset.

Lab Overview:

Assignment-3-Sword-vs.-Shield-Fall2024-1-1-2Download
annotated-Assignment20320-20Sword20vs.20Shield-1-1Download

Proudly powered by WordPress | Theme: Dyad by WordPress.com.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.Accept