- 
  
   This was the first of the weekly cyber security quizzes. This was the first of the weekly cyber security quizzes.
 Mark: 81.00 / 100.00- Answered all but one question well, which was an incorrect choice on "What information is used to thwart cyber criminals".
- All other questions answered correct.
 
- 
  
   This was the second of the weekly quizzes. This was the second of the weekly quizzes.
 Mark: 63.33 / 100.00- Majority of the questions were answered correctly.
- Main wrong answers were on multiple choice.
- Hashing Functions, Data Integrity, and Design Principles were some of the answers I got wrong (multiple choice).
 
- 
  
   This was the third of the weekly quizzes. Mark: 63.89 / 100.00 Things I got wrong throughout: This was the third of the weekly quizzes. Mark: 63.89 / 100.00 Things I got wrong throughout:- Injection
 
- 
  
  Not graded yet.- Learnt the basic fundamentals of hashing.
- Created example hashes.
- Decrypted the example hashes I made.
 
- 
  
  Not graded yet.- Learnt about ceaser cipher, and what it was used for primarily in the past.
- Learnt about vigenere cipher and its uses.
- Created charts for both encryption methods and learnt what keys are.
 
- 
  
  Not graded yet.- Learnt about the security procedures google have in place to protect their company and users.
- Learnt about the way google destroys/recycles old/faulty hardware.
- Learnt further about googles two factor authentication.
 
- 
  
  Within this cyber security lab we completed the following tasks in Packet Tracer. I achieved full marks on all sections.- Configure the FTP Server
- Configure the Web Server
- Configure the Email Server
- Configure the DNS Server
- Configure the NTP Server
- Configure the AAA Server
 
- 
  
  - The FTP server allows you to upload/download files from an external server, as well as store them in a remote location.
- The Web server allows you to host website files to be accessed on the WWW (World Wide Web).
- The Email server allows you to send/receive emails from internal and external sources.
- The DNS server manages the internal structure of the network it's apart of, this can be used to resolve FQDN's and host names.
 
- 
  
  Within this cyber security lab we completed tasks relating to insecure/secure protocols. We also retrieved information which was gathered using a hacker's sniffing tool from the insecure protocols which we used within the network. Below are some of the things I did within this lab:- Send email between users.
- Upload and download files using FTP.
- Remotely access an enterprise router using telnet.
- Remotely access an enterprise router using SSH.
 
- 
  
  Objectives Part 1: Locate the FTP Account Credentials for Mary’s Laptop Part 2: Upload Confidential Data using FTP Part 3: Locate the FTP Account Credentials for Bob’s PC Part 4: Download Confidential Data using FTP Part 5: Decrypt the Contents of the clientinfo.txt File