1. Create a network infrastructure design communications document that includes identified hardware components, connections to outside world, identified physical layer connectivity (media) and addressing, including operational and security components in the design.
|
|
These projects in packet tracer incorporate network infrastructure designs, hardware components, physical layer connectivity, and all other required objective details in order to create a digitally functional representation of how a real-world network would function in an organization. These projects are examples of real-world network infrastructure designs that have been manually configured by configuring switches, routers, servers, and various other machines shown in the digital infrastructures above.
2. Install, configure and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection systems, intrusion detection systems, firewalls, system hardening, anti-virus tools, patch management, auditing and assessment.
|
|
Throughout this enumeration and scanning project, I used various tools in order to test the physical and digital security of websites. Some of these tools include port scanning, Nmap, and the Kali Linux terminal.
|
In this project I improved the overall security of my personal computer. This file has screen shots and step-by-step instructions surrounding how I improved my machine's overall vulnerability, hardening the digital security or the computer.
|
3. Construct, implement and document a script or a program to automate a security-related process or other tasks such as installation, administration, management, mapping resources, logon scripts, patch management, updates, auditing, analysis and assessment.
|
|
Auto-Deploy is a program developed via PowerShell for the company Amazon that automates the deployment of specific local software and websites. This tool is highly customizable allowing you to deploy and configure unlimited sets of websites and applications. This tool can also be used to mass install software onto a machine, allowing you to efficiently install software without needing to find a download source or open installation wizards one-by-one. See SIP presentation video for further information surrounding the application and how it's made a world-wide impact through Amazon.
4. Create a policy or procedure that addresses events such as: a disaster recovery plan, a business continuity plan, an incident response policy, an acceptable usage document, an information security policy, a physical security policy, assessments or troubleshooting procedures.
|
|
Working at Amazon's Global Security Operations Center as a business continuity analyst, I was able to work first hand conducting disaster recovery procedures for hundreds of thousands of Amazon facilities all across the world. This allowed me to develop a very successful business continuity plan for my business continuity school course presentation and document.
5. Develop a research report or implementation plan concerning legal and ethical best practices and mandated requirements that pertain to information security.
|
|
I developed this presentation regarding the best ethical practices and mandated security requirements when implementing Voice Over IP. This presentation surrounds the National Institute of Standards and Technology's publication of SP 800-58.
|
I created this research report regarding various large organization's unethical practices of a user's personal data and compared these practices to more ethical practices used by smaller organizations that keep the users data confidential.
|
cybercrime_report.docx | |
File Size: | 9 kb |
File Type: | docx |
In the document above, I researched cybercrime regarding whether or not if it's ethical to hack into malicious digital actors. I also covered information surrounding individuals who breach into malicious scammer's organizations.
6. Research, document, test and evaluate several current industry information security based threats, risks, malicious activities, covert methodology, encryption technologies, mitigation techniques or unconventional tactics to prevent loss of sensitive information and data confidentiality, integrity and availability.
12_principles_of_security.docx | |
File Size: | 18 kb |
File Type: | docx |
In the document above, I researched the 12 principles of information security in order to improve my security team's knowledge surrounding maintaining confidentiality of data and information.
In the document above, I researched community-based firewall log collection system named DShield. DShield is a tool which helps develop and improve firewalls due to the open-source log sharing from the security community.
|
In the presentation above, I researched and deployed a successful Security Program at Amazon surrounding the topics of physical security, digital security, and cryptography.
|
@2022 Adalberto Ruiz Arvizu All Rights Reserved