Cybersecurity

By 2000739
  • Quiz 1

    Quiz 1
    This was the first of the weekly cyber security quizzes.
    Mark: 81.00 / 100.00
    • Answered all but one question well, which was an incorrect choice on "What information is used to thwart cyber criminals".
    • All other questions answered correct.
  • Quiz 2

    Quiz 2
    This was the second of the weekly quizzes.
    Mark: 63.33 / 100.00
    • Majority of the questions were answered correctly.
    • Main wrong answers were on multiple choice.
    • Hashing Functions, Data Integrity, and Design Principles were some of the answers I got wrong (multiple choice).
  • Quiz 3

    Quiz 3
    This was the third of the weekly quizzes. Mark: 63.89 / 100.00 Things I got wrong throughout:
    • Injection
    - WEP Protocol
  • Hashing Algorithm Research

    Not graded yet.
    • Learnt the basic fundamentals of hashing.
    • Created example hashes.
    • Decrypted the example hashes I made.
  • Cipher Chart (Lesson Practical)

    Not graded yet.
    • Learnt about ceaser cipher, and what it was used for primarily in the past.
    • Learnt about vigenere cipher and its uses.
    • Created charts for both encryption methods and learnt what keys are.
  • Google datacenter / Security Key

    Not graded yet.
    • Learnt about the security procedures google have in place to protect their company and users.
    • Learnt about the way google destroys/recycles old/faulty hardware.
    • Learnt further about googles two factor authentication.
  • Lab - 1.5.3.5

    Within this cyber security lab we completed the following tasks in Packet Tracer. I achieved full marks on all sections.
    • Configure the FTP Server
    • Configure the Web Server
    • Configure the Email Server
    • Configure the DNS Server
    • Configure the NTP Server
    • Configure the AAA Server
  • Lab - 1.5.3.5 - Definitions

    • The FTP server allows you to upload/download files from an external server, as well as store them in a remote location.
    • The Web server allows you to host website files to be accessed on the WWW (World Wide Web).
    • The Email server allows you to send/receive emails from internal and external sources.
    • The DNS server manages the internal structure of the network it's apart of, this can be used to resolve FQDN's and host names.
  • Lab - 1.5.3.6

    Within this cyber security lab we completed tasks relating to insecure/secure protocols. We also retrieved information which was gathered using a hacker's sniffing tool from the insecure protocols which we used within the network. Below are some of the things I did within this lab:
    • Send email between users.
    • Upload and download files using FTP.
    • Remotely access an enterprise router using telnet.
    • Remotely access an enterprise router using SSH.
  • Lab - 2.5.2.6

    Objectives Part 1: Locate the FTP Account Credentials for Mary’s Laptop Part 2: Upload Confidential Data using FTP Part 3: Locate the FTP Account Credentials for Bob’s PC Part 4: Download Confidential Data using FTP Part 5: Decrypt the Contents of the clientinfo.txt File