Professional Portfolio
-
Phishing Skills
My goal is to stay organized. So, here are the main learning objectives: familiarization of phishing attacks, identify various types of phishing attacks, and identify practical tools to assist in analyzing phishing attacks.
-
“Attack Targets on the Internet”
There are script kiddies who succeed blindly and there are black hats who have larger fish to fry. This second chapter helps to draw a picture somewhere in the middle between the basement movie scene and the super-secret-squirrel black hat. Referencing the Lockheed Martin Cyber Kill Chain, there are 7 distinct steps a white hat,…
-
“Learning More About Cybersecurity and Threats”
My Linux project has been on the back burner since my workload has picked up. The workload in field services is hefty compared to being on the tech refresh team. Transitioning from tech refresh to field services was a great decision. Without a doubt, it has improved my troubleshooting and technical knowledge. Field services stays…
-
Post-Install: Part 2
Configuring a Linux Firewall— Basics Continuing on the Ubuntu post-install process, we will expound on user control through the use of the uncomplicated firewall. We already allowed a specified account to run sudo for administrative privileges although that specified account is not an administrative account. We also dabbled in adding and removing users and groups.…
-
Ubuntu Post-Install
As soon as your chosen Linux flavor is installed, its best to do some things immediately. My approach is a mix of Ubuntu’s installation tutorial, Ubuntu’s desktop guide, and Network Chuck’s YouTube videos. By no means are these steps my own. Here we go. Installing updates Installing updates was the easiest task to complete. It…