cyber security 25/11/2021Last lesson we completed a task in packet tracer based on data integrity and how to check the data hasn't been breached.
We then documented the lab and what we did in it.
White Hat: Gathering information on what I need to do from the instructions to accomplish this task.
02/12/2021Today in Lab 5, we looked at configuring WiFi networks for all three geographic sites of the activity. We utilized WEP, WPA2 PSK, and WPA2 RADIUS to demonstrate the varying configuration of WiFi networks and their security considerations.
White Hat: Gathering information such as what security should be implemented into the configuration and what is needed to integrate each user into the network.