Network Engineering Objectives
.1. Analyze the business needs of the organization while applying appropriate tools
and frameworks to create solutions
2.Develop cloud infrastructure using appropriate orchestration tools that focus on
emphasizing the best benefits of remote infrastructure
3. Integrate software development frameworks designed to exploit the horizontal
scaling of cloud computing.
4. Develop communication skills that facilitate the understanding of complex technology-
related topics by laymen, as well as being able to provide technical writing when appropriate
5.Design communications environments that incorporate all facets of enterprise needs to
include traditional networking but also account for needs and security within IoT, mobile
devices, and integration of non-enterprise-owned devices
6.Develop all solutions with a security-first attitude while using best practices such as test-
driven development
and frameworks to create solutions
2.Develop cloud infrastructure using appropriate orchestration tools that focus on
emphasizing the best benefits of remote infrastructure
3. Integrate software development frameworks designed to exploit the horizontal
scaling of cloud computing.
4. Develop communication skills that facilitate the understanding of complex technology-
related topics by laymen, as well as being able to provide technical writing when appropriate
5.Design communications environments that incorporate all facets of enterprise needs to
include traditional networking but also account for needs and security within IoT, mobile
devices, and integration of non-enterprise-owned devices
6.Develop all solutions with a security-first attitude while using best practices such as test-
driven development
Network Engineering work
I have taken classes that cover these objectives including but not limited to: Business continuity and disaster recovery, AWS Cloud security, Infosec standards and regulation, security essentials. My final for NTS435 "Guide to Selecting Information Security Products: Policy SP 800-36" fulfils the requirements for objectives 5 and 4. For objectives 1, 2, 3 and 6 " Building a Simple Serverless Application with Lambda" for NTS336 works as a great demonstration of my skills.
Network Engineering Objectives
Network Engineering Objectives
Network Security Objectives
1. Create a network infrastructure design communications document that includes
identified hardware components, connections to the outside world, identified physical
layer connectivity (media) and addressing, including operational and security
components in the design.
2.Install, configure and test security hardware and software tools with supporting
documentation such as port scanners, vulnerability detection systems, intrusion
detection systems, firewalls, system hardening, anti-virus tools, patch management,
auditing and assessment
3. Construct, implement and document a script or a program to automate a security-
related process or other tasks such as installation, administration, management, mapping
resources, logon scripts, patch management, updates, auditing, analysis and assessment.
4.Create a policy or procedure that addresses events such as: a disaster recovery plan, a
business continuity plan, an incident response policy, an acceptable usage document, an
information security policy, a physical security policy, assessments or troubleshooting
procedures.
5. Develop a research report or implementation plan concerning legal and ethical best
practices and mandated requirements that pertain to information security
6.Research, document, test and evaluate several current industry information security-
based threats, risks, malicious activities, covert methodology, encryption technologies,
mitigation techniques or unconventional tactics to prevent loss of sensitive information
and data confidentiality, integrity and availability.
identified hardware components, connections to the outside world, identified physical
layer connectivity (media) and addressing, including operational and security
components in the design.
2.Install, configure and test security hardware and software tools with supporting
documentation such as port scanners, vulnerability detection systems, intrusion
detection systems, firewalls, system hardening, anti-virus tools, patch management,
auditing and assessment
3. Construct, implement and document a script or a program to automate a security-
related process or other tasks such as installation, administration, management, mapping
resources, logon scripts, patch management, updates, auditing, analysis and assessment.
4.Create a policy or procedure that addresses events such as: a disaster recovery plan, a
business continuity plan, an incident response policy, an acceptable usage document, an
information security policy, a physical security policy, assessments or troubleshooting
procedures.
5. Develop a research report or implementation plan concerning legal and ethical best
practices and mandated requirements that pertain to information security
6.Research, document, test and evaluate several current industry information security-
based threats, risks, malicious activities, covert methodology, encryption technologies,
mitigation techniques or unconventional tactics to prevent loss of sensitive information
and data confidentiality, integrity and availability.
Network Security Work
I have taken classes that cover these objectives including but not limited to: Business continuity and disaster recovery, AWS Cloud security, Infosec standards and regulation, security essentials. For objective 1 my SIP Project: ChartLight is an excellent example of utilizing hardware and software to address operational security though suggestion of design. For objective 2 "NTW File encryption" from the class NTW102 is perfect, for objective 3 assignment " Attempting to make a backup domain controller" works well. For objective 4 and 5 "BCDR final for NTW 440" was an excellent example of team collaboration on the objectives. A self case study as demonstrated in "13.1 Case study" NTS310 is a perfect example of research, and documentation of malware and associated tactics for objective 6.
Network Security Objectives
Network Security Objectives
Technology Forensics Objectives
1. Articulate the complexities of network and application infrastructure and apply
critical thinking skills to how they affect technology forensics investigations and
incident response procedures.
2. Identify and apply in a forensics context the various topologies, standards,
technologies and protocols employed in computer systems, including file system
formats and their attributes.
3. Evaluate, select and deploy computer forensic measures for the response,
mitigation and analysis of a security incident pertaining to digital artifacts and how
information was compromised
4. Analyze and evaluate the current investigative and legal aspects of information
and computer forensics, including electronic discovery, depositions, litigation and
corporate personnel processes.
5. Evaluate and execute the strategies, methodologies, techniques and state-of-the-art
forensics tools for the preservation of digital evidence on computer systems, network
systems and other electronic devices.
6.Create tracking processes to follow the trail of electronic evidence through digital
systems, including documentation, formal reporting and presentation.
critical thinking skills to how they affect technology forensics investigations and
incident response procedures.
2. Identify and apply in a forensics context the various topologies, standards,
technologies and protocols employed in computer systems, including file system
formats and their attributes.
3. Evaluate, select and deploy computer forensic measures for the response,
mitigation and analysis of a security incident pertaining to digital artifacts and how
information was compromised
4. Analyze and evaluate the current investigative and legal aspects of information
and computer forensics, including electronic discovery, depositions, litigation and
corporate personnel processes.
5. Evaluate and execute the strategies, methodologies, techniques and state-of-the-art
forensics tools for the preservation of digital evidence on computer systems, network
systems and other electronic devices.
6.Create tracking processes to follow the trail of electronic evidence through digital
systems, including documentation, formal reporting and presentation.
Technology forensics Work
I have taken classes that cover these objectives including but not limited to: Business continuity and disaster recovery, AWS Cloud security, Infosec standards and regulation, security essentials. all objectives listed can be met with assignment 13.1 Case study from the class NTS 310.
Technology Forensics
Technology Forensics