Cybersecurity and Incident Management

  • Introduction

    You will examine the different types of cybersecurity attacks, vunerabilities that exist in networked systems and how you can defend against cyber attacks beffore it occures. You should start to understand the current threats to systems and how to manage a cyber incident.
    As IT systmes evolve, there is an increasing need in IT proffessionals to protect networkewd systems and the information they contain.
  • AO1

    Show knowledge and understanding of technical language, security threats, system vulnrabilities and security protection methods, and implications resulting from successful threats.
    So understnad what your talking about, what is dangerouse to your system, where your system is at its weakest and what you can do better to cover up or invalidate attacks.
  • AO2

    Apply knowledge and understanding of security threats, system vulnrebilities and security protection methods and implications in order to risk assess systems and select appropriate tools to secure them.
  • AO3

    Analyse forensic(scientific tests or techniques used in connection with the detection of crime. IE. Electronic.) evidence data and information to identify security breaches and manage security incidents.
  • AO4

    Evaluate protection methods and security documentation to make reasoned judgements and draw conclusions about their efficiency.
    (Do the methods you use actually work and for how long?)
  • AO5

    You should be able to plan a secure computer network and manage security incidents with appropriate justification.
    (Why should your mehod be used instead of another?)
  • What we did last week

    We looked at the introduction and brief of the course as well as the learning objectives and requierments for pass merit and distinction. We created a few time toast (no really?!) events summerrising the introduction and the learning objectives.
    I also completed chapter 1 Quiz 1 on Cisco Academy.
  • What we did today

    We went over tbe content of chapter 1 of cybersecurity. Found the differenc between hackers (White, Grey, Black) as well as internal/external threats, what attackers target when looking for information to steal. The different vulnerabilities a company or general cybernetwork has. Stated excercise 1 for Cybersecurity.
  • What we did Today

    We started the second set of exercises. Mainly focusing on AAA (Authentication, Authorization, Accounting). MD5 and SHA1 Hashing, the advantages and disadvantages of Sneakernet, Wired and Wirless networks and the protocols of ISPec. We also started work on packet tracer and managed to make abasic network connection five computers to a single switch, connected to a single router that connects to two other routers. In total, 20 PC's, 4 Switches and 4 Routers.
  • What we did past week

    We went over tbe content of chapter 1 of cybersecurity. Found the differenc between hackers (White, Grey, Black) as well as internal/external threats, what attackers target when looking for information to steal. The different vulnerabilities a company or general cybernetwork has. Stated excercise 1 for Cybersecurity.
  • What we did today

    We started to work on excercise 2 for cybersecurity. Looking at types of threats (Viruses, Trojans, Ransomeware) Methods of Deception (Phishing, Browser Hijacking, SEO Poisoning). Types of Cyber Attacks (DoS, Man-in-the-Middle, Zero-day attack) and methods used to secure communication.
  • What we did last week

    We started the second set of exercises. Mainly focusing on AAA (Authentication, Authorization, Accounting). MD5 and SHA1 Hashing, the advantages and disadvantages of Sneakernet, Wired and Wirless networks and the protocols of ISPec. We also started work on packet tracer and managed to make abasic network connection five computers to a single switch, connected to a single router that connects to two other routers. In total, 20 PC's, 4 Switches and 4 Routers.
  • What we did last week

    We started to work on excercise 2 for cybersecurity. Looking at types of threats (Viruses, Trojans, Ransomeware) Methods of Deception (Phishing, Browser Hijacking, SEO Poisoning). Types of Cyber Attacks (DoS, Man-in-the-Middle, Zero-day attack) and methods used to secure communication
  • What we did today

    We started the fourth set of excercises for Cybersecurity. I didn't fully understand manny of the subjects so I will have to go through them again in more detail. We looked at different cyber encryption methods and algorithms, both symetric and asymetric. We also looked at One time pad (OTP) and Acces Control Lists.
  • What we did today

    We finished covering the last two excercises from chapter four and started to work on chapter 5, which focused a lot on hashing. We talked briefly about the Pigeonhole Principle and the number combinations possible in some Hashing algorithms. (MD5, SHA3, ETC)
  • What we did last week

    We started the fourth set of excercises for Cybersecurity. I didn't fully understand manny of the subjects so I will have to go through them again in more detail. We looked at different cyber encryption methods and algorithms, both symetric and asymetric. We also looked at One time pad (OTP) and Acces Control Lists.
  • What we did last week

    We finished covering the last two excercises from chapter four and started to work on chapter 5, which focused a lot on hashing. We talked briefly about the Pigeonhole Principle and the number combinations possible in some Hashing algorithms. (MD5, SHA3, ETC)
  • What we did today

    We did brief excercises on decimal to binary conversion as well as how much time the networks can be down for based on a contract, which i did unsuccessfully and need to go over it again to get a better understanding. We covered the 5 9's availability, what networks need them the most. We talked about singel points of failure. We also made a network to show the effects of a spanning tree protocol which i also don't fully understand..
  • What we did on 21/10/2021

    We did brief excercises on decimal to binary conversion as well as how much time the networks can be down for based on a contract, which i did unsuccessfully and need to go over it again to get a better understanding. We covered the 5 9's availability, what networks need them the most. We talked about singel points of failure. We also made a network to show the effects of a spanning tree protocol which i also don't fully understand..
  • What we did today

    I finnished doing a LAB in cisco Packet tracer. Focusing on setting up an FTP (File Transfer Protocol). I also set up the Email server, NTP/AAA Servers, Web and DNS servers.
  • What we did last week

    I finnished doing a LAB in cisco Packet tracer. Focusing on setting up an FTP (File Transfer Protocol). I also set up the Email server, NTP/AAA Servers, Web and DNS servers.
  • What we did today 11 11 2021

    What we did today 11 11 2021
    I mainly focused on the second lab today, going through it as best as I could and managed to get full marks. I did struggle a bit but it was only because of me misreading the instructions. We got nitroduction to the workbook/revision guid.
  • Looking at past Papers

    Looking at past Papers
    The exam looks to be quite daunting but it can be done if put enough time and reseach in ones spare time and with enough preperation. I need to try and identify my weaknesses and work on them.
    I'll need to practice risk identification and assessment. I'll revisit the cisco network academy lesson on internal and external threats. As my attempt was unsatisfactinary and not good enough. Even if it was barely an attempt. Need to start putting in more effort.
  • What we did last week

    We looked at past exam papers. The exam looks to be quite daunting but it can be done if put enough time and reseach in ones spare time and with enough preperation. I need to try and identify my weaknesses and work on them.
    I'll need to practice risk identification and assessment. I'll revisit the cisco network academy lesson on internal and external threats. As my attempt was unsatisfactinary and not good enough. Even if it was barely an attempt. Need to start putting in more effort.
  • What we did today. 25/11/2021

    For the first 1/3 of the lesson I focused on past exam papers. I looked over the examiner sheet and the questions. The questions themselves are identical, with only the topic being different. For the other 1/3 I worked on a LAB. I didn't get far with it but I can continue working on it later on. On the last 1/3 I worked on the cloud assigement. Progress was minimal but I now have a clear layout that I can work with.
  • What we did today

    What we did today
    Fact:I completed my Lab2
    Emotion:I didn't feel antthing worth mentioning.
    Idea:I want to improve my working speed.
    Plan:I'll practice more labs in my spare time.
    Judgement:It wasn't nessecerily beneficial since I didn't quite understand why I was doing it. I understood what I was doing but not why.
  • What we did last week

    Fact:First focusing on past exampapers, then attmpting a LAB and last progressing my cloud assigement.
    Emotion: The tasks were quite simple and I was starting to understand the general layout and rules of the upcoming exams.
    Benefit: I managed to gain a bit of progress in all categorys.
    Ideas:I need to improve my time management.
    Planning:I plan on catching up with the labs and cisco chapters.
    Judgement:I didn't truly benefit from the lab since ftp and telnet are no longer used.