Algorithm for File Updates in PythonIn this mock-project, as a security analyst for a healthcare organization I will be creating an algorithm that will restrict document…Aug 5, 2023Aug 5, 2023
Working with SQL QueriesFor this project, I will be using SQL queries to examine and filter an organization’s data after discovering a potential security issue…Aug 5, 2023Aug 5, 2023
File Permissions in LinuxUsing the VM provided by Google and Coursera, I will be demonstrating the skills that I have learned regarding navigating around…Aug 5, 2023Aug 5, 2023
Checking/Comparing Hashes in LinuxUsing the VM provided by Google and Coursera, I will be using sha256 and cmp commands to compare the hashes of two files that seem to look…Aug 5, 2023Aug 5, 2023
Splunk BOTSv1 — Web Defacement Incident Response Project** WARNING LONG READ AHEAD**Aug 5, 2023Aug 5, 2023
Honeypot Project w/ MS Azure SentinelI will be using MS Azure with their free VM to create a honeypot and integrate the logged data from the honeypot onto an attack map with…Aug 4, 2023Aug 4, 2023
Analyzing Packet Data with SuricataI will be using Suricata to examine a packet log and with the custom rule provided, determine how many events occurred within the log, and…Jul 21, 2023Jul 21, 2023