-
Quiz 1
This was the first of the weekly cyber security quizzes.
Mark: 81.00 / 100.00- Answered all but one question well, which was an incorrect choice on "What information is used to thwart cyber criminals".
- All other questions answered correct.
-
Quiz 2
This was the second of the weekly quizzes.
Mark: 63.33 / 100.00- Majority of the questions were answered correctly.
- Main wrong answers were on multiple choice.
- Hashing Functions, Data Integrity, and Design Principles were some of the answers I got wrong (multiple choice).
-
Quiz 3
This was the third of the weekly quizzes. Mark: 63.89 / 100.00 Things I got wrong throughout:- Injection
-
Hashing Algorithm Research
Not graded yet.- Learnt the basic fundamentals of hashing.
- Created example hashes.
- Decrypted the example hashes I made.
-
Cipher Chart (Lesson Practical)
Not graded yet.- Learnt about ceaser cipher, and what it was used for primarily in the past.
- Learnt about vigenere cipher and its uses.
- Created charts for both encryption methods and learnt what keys are.
-
Google datacenter / Security Key
Not graded yet.- Learnt about the security procedures google have in place to protect their company and users.
- Learnt about the way google destroys/recycles old/faulty hardware.
- Learnt further about googles two factor authentication.
-
Lab - 1.5.3.5
Within this cyber security lab we completed the following tasks in Packet Tracer. I achieved full marks on all sections.- Configure the FTP Server
- Configure the Web Server
- Configure the Email Server
- Configure the DNS Server
- Configure the NTP Server
- Configure the AAA Server
-
Lab - 1.5.3.5 - Definitions
- The FTP server allows you to upload/download files from an external server, as well as store them in a remote location.
- The Web server allows you to host website files to be accessed on the WWW (World Wide Web).
- The Email server allows you to send/receive emails from internal and external sources.
- The DNS server manages the internal structure of the network it's apart of, this can be used to resolve FQDN's and host names.
-
Lab - 1.5.3.6
Within this cyber security lab we completed tasks relating to insecure/secure protocols. We also retrieved information which was gathered using a hacker's sniffing tool from the insecure protocols which we used within the network. Below are some of the things I did within this lab:- Send email between users.
- Upload and download files using FTP.
- Remotely access an enterprise router using telnet.
- Remotely access an enterprise router using SSH.
-
Lab - 2.5.2.6
Objectives Part 1: Locate the FTP Account Credentials for Mary’s Laptop Part 2: Upload Confidential Data using FTP Part 3: Locate the FTP Account Credentials for Bob’s PC Part 4: Download Confidential Data using FTP Part 5: Decrypt the Contents of the clientinfo.txt File