Cyber security 2

  • Introduction

    Increasing the dependence on computer systems and data they contain makes us at risk to attacks from cyber criminals, also to the loss of there systems, if there been an accident or a disaster hits. As IT system security is better, more complex attacks are developed over time, organizations need to have plans to deal with a cyber security incident before it happens. IT professionals need a good understanding of the threats to the systems, how to appropriate and how to manage a cyber security.
  • Assessment outcomes

    (A1) showing knowledge as well as understanding of technical language, security threats, system weakness and security protection technique and result from successful threats. (A2)
    Use knowledge and understanding of the security threats, system weakness and the security protection technique and the implications in order to risk assess systems and select relevant tool to secure them. (A3) Examine forensic proof data and info to recognize security breaches and control security incidents.
  • Assessment outcomes

    (A4) Evaluate protection technique and information to identify security breaches and control security incidents. (A5) Be able to plan a secure computer network and control security incidents with appropriate justification.
  • Period: to

    Cyber security 2

  • lesson 2 start

    Last week I have do an introduction and assessments on the unit.
    looked in to the unit in more detail.
    and sigh in to cisco.
  • lesson 2 end

    cisco quiz test 1 and power point threats
  • lesson 3 start

    cisco quiz test 1 and power point on threats
  • lesson 3 end

    Done cisco packed tracer and power point on AAA, Integrity and ,Sneakernet, Wired networks, Wireless networks and IPSec
  • lesson 4 end

    last week i have done cisco packed tracer and power point on AAA, Integrity and ,Sneakernet, Wired networks, Wireless networks and IPSec and understand the questions.
  • lesson 4 end

    i have done Cybersecurity Essentials power on Threat and Attack. e.g. Virus, Worm, Trojan Horse and i have done Exercise1, Exercise2, Exercise3, Exercise4, Exercise5
  • lesson 5 start

    last lesson I have done Cybersecurity Essentials power on Threat and Attack. e.g. Virus, Worm, Trojan Horse and i have done Exercise1, Exercise2, Exercise3, Exercise4, Exercise5
  • lesson 5 end

    i have done a power point on Cryptography, Symmetrical Encryption and asymmetric algorithms and OTP
  • Lesson 6 start

    I have done a power point on Cryptography, Symmetrical Encryption and asymmetric algorithms and OTP and factor Authentication, and Steganography
  • Lesson 6 end

    I have finished off last weeks power point and working on Hashing Algorithms, pigeonhole principle and the length on SHA3 and next week will work on exercise 3 and 4
  • lesson 7 start

    Last week I have finished off last weeks power point and working on Hashing Algorithms, pigeonhole principle and the length on SHA3 and this week I will work on exercise 3 and 4
  • lesson 7 end

    This week I have made a power point on the 5 9s, what is a single point of failure, What is meant by system resilience, What is meant by fault tolerance?, a DID analogy of a castle, different numbers of RAID and about spanning tree.
  • lesson 8 end

    This week I have done lab 1 on packet tracer and made a word doc on how i made it and key words like AAA, FTP, DNS and talked about each one and what it does.
  • lesson 8 start

    the week before the holiday, I have made a power point on the 5 9s, what is a single point of failure, What is meant by system resilience, What is meant by fault tolerance?, a DID analogy of a castle, different numbers of RAID and about spanning tree.
    Add tags +
  • lesson 9 start

    lesson 9 start
    Last week I have done lab 1 on packet tracer and made a word doc on how I made it and keywords like AAA, FTP, DNS and talked about each one and what it does.
  • lesson 9 end

    lesson 9 end
    In today's lesson, I have completed the lab and have uploaded it to the vle, and started the workbook, and done the review. I have explained the key points in the lab and there is an exam in Jan.
  • lesson 10 start

    lesson 10 start
    I need to research what is class C and ipv4 address and how to make a management report.
  • lesson 10 end

    lesson 10 end
    In the part B exam, I need to look up what is a piece of forensic evidence and look at how to do an incident analysis and security report and done lab 3 with word and uploaded
  • lesson 11 start/end

    lesson 11 start/end
    In this lesson, I have been having a look at activity 1 on the cyber exam on risks on networks. Completed lab4 and uploaded it. Need to research more on the exam including risks on networks.
  • lesson 12 start/end

    lesson 12 start/end
    white - I have been looking through exam part A and Activity 1.2.3 risk assessment, security plan, management report, and had a look at other students work from the exam.
    Red- Nervous because of how much info is in the exam and the student's work.
    yellow- I found looking at the student's work helps me to understand part A.
    green- I need to make notes on the exam.
    blue- Planning (process control)- plan the time to revise for the exam and look at part B
    black- I feel a bit nervous about the exam.