CYSE 495

https://docs.google.com/document/d/12CiCtOs-wYlDP-zFjkQh4BQrETDiSPliyaUamCx4fac/edit?tab=t.0

The above link is an interactive lab that I did for my cyber risk management class. The goal of this task was to help me learn more about how to handle sensitive and secret information in a business setting. Through a number of interactive lessons, I learned why security protocols are important, how to classify information, and what to do if your security is breached. As the training went on, I was given different situations that made me think about what would happen if I handled private data incorrectly. The involved nature of the task kept me interested in learning and let me use what I had learned in the classroom in real life. It was helpful to have clear explanations and pictures to help me remember what I was learning. I learned important skills and information that are important in today’s information-driven world, and this experience made a big difference in my career growth. It is very important to understand the rules for handling secret compartmented information (SCI), especially in fields that need to follow security steps very closely. This training has not only made me more aware of information security, but it has also made me feel more responsible as a worker. In general, this project had a big impact on how I think about information security, and I’m sure that the skills I learned will help me in my future work.

https://docs.google.com/document/d/1vvvLM4Mr6NsoCVKByu_s_VWzD_LByvPi1a-6puov1v4/edit?tab=t.0

The goal of this interactive lab above was to help me learn more about risk management, especially when it comes to data and technology protection. Through a number of interactive tasks, I learned about different threats to information systems and how to properly evaluate and handle them. As I worked on the task, I had to deal with situations where I had to sort threats into groups and match them with the right risk management methods. This process taught me a lot because it made me think deeply about the effects of various risks, like malware and scams, and the best ways to protect myself from them. The hands-on method made learning more powerful by letting me use what I had learned in the classroom in real life. This task helped me grow professionally by making me better at analyzing things and knowing how to assess risk. Learning how to figure out the Annualized Loss Expectancy (ALE) and other measures has helped me make smart choices about investments and tactics for cybersecurity. This information is very important for professionals to know in a world that is becoming more and more digital, especially in areas where data security is very important. This project taught me important risk management skills that I will use in my future work. It not only made me think about cybersecurity in a new way, but it also made me more determined to keep up high standards of information security in all of my future professional work.

https://docs.google.com/document/d/13YXgc-dAcQ4HPL898PTV4nqxLVpCiO0s6mcfsV0XnCU/edit?tab=t.0

The goal of this task was to give you a full understanding of penetration testing (pen testing) and all of its stages, which is necessary for figuring out how well a company is protecting itself. I learned about the important steps in pen testing through a number of hands-on activities, ranging from planning and reconnaissance to analysis and reports. As I worked on the assignment, I had to solve real-life problems that needed me to figure out the right steps to take and tools to use for each part of pen testing. This hands-on method was very helpful because it let me use what I had learned in a formal setting. It was really interesting to learn the difference between passive and active reconnaissance methods, which are both important for getting information before a real test. By helping me learn more about safety practices, this task made a big difference in my professional growth. I learned useful skills that I can use right away in the field by studying the specific tools used in each step, like Nikto for scanning and Metasploit for keeping access. This information is very important for people who want to work in cybersecurity because it shows how important it is to find and fix weaknesses in a planned way.