-
last lesson we configured a network in cisco. we configured an email server, a NTP, dns server, a AAA server and we activated the NTP server
-
this week we worked on LAB 2 which included sending emails inside of a closed network and uploading files using FTP
-
last lesson we configured a network and sent an email on an email server and uploading files using FTP
-
this lesson we did LAB 3 which included encryption
-
last lesson we did LAB3 which included encryption and many other things
-
this lesson we did lab4 and someother reseach and studying for the cyber security exam in january
-
-did lab5 then did work for project management
-i think this is going to take longer than it needs to because of these stupid timetoasts
-these labs are easy and i can finish them in under 30 minutes
-i do not have enough energy to revise because of timetoasts
-i plan to revise more in lesson
-i think that doing timetoasts is a complete waste of time and energy, it is going to make me finish this assignment later than i should because of this stupuid website -
-did some work on the assignment, also created an email for the client
-i think this is going to take longer than it needs to because of these stupid timetoasts
-i can get this unit done within a week
-i do not have enough energy to work on the assignment because of timetoasts
-i plan to finish the assignment withing 2 weeks
-i think that doing timetoasts is a complete waste of time and energy, it is going to make me finish this assignment later than i should because of this stupuid website -
last session we went over the terminology of the cyber security industry and looked at the differant types of hackers such as black, white and gray hat hackers and hacktavists
-
last week we went over the basics of cyber security and learned some of the terminology
-
we went over some more of the terminology used in cyber security and looked at the vulnerabilities and differant areas that hackers may target
-
last lesson we went over some more of the terminology used in cyber security and learned about some of the vulnerabilities that hackers may target
-
we went over hashing algorithems and learned authentication methods
-
last week we created a functioning network on cisco packet tracer and learned about some of the vulnerabilities that we may face in the future
-
we went over the vulnerabilities that some networks face, for example phishing, whaling, trojan horses etc
-
we looked at the differant featured of cryptography and how differant algorithems work with the alc and otp protocals
-
we went over some hashing algorithems and how many differant combinations are in each, we also looked at how hackers may hide data inside media files
-
last session we worked on the assignment and looked at the roles of team members in team and what jobs they do and how important they are to the project
-
last lesson we looked at integrity and digital signatures
-
this lesson we went over some of the raid models and how differant industries protect their data
-
last lesson we went over conversions in binary code
-
this lesson we configed a cisco network with email servers, dns servers and ntp