Education
Completed Courses taken from Bellevue University
Below are research projects I have completed while attending Bellevue. To view course projects, click on the highlighted links.
Traffic shaping is an effective way to deal with congestion of a network by limiting what traffic enters a network. Connection speeds are sometimes limited because there are multiple hosts but not enough channels to transmit and receive the network data.
Recovering lost or stolen data through investigation and analysis techniques. Collected evidence is examined and presented in a court of law.
The scheduled report highlights the informational needs for a business managing supplies, suppliers, customers, bids and costs. Key indicator reports provide necessary information needed to improve customer service techniques and boost sales.
The National Institute of Standards and Technology (NIST) special publication 800-137 explains in order to effectively address ever-increasing security challenges, a well-designed ISCM (Information Security Continuous Monitoring) strategy is necessary.
In the event of a natural disaster or security breach, contingency planning or “backup planning” can be thought of as a roadmap or guide to restore services after an anomaly has transpired.
Security awareness training provides an insight on identifying the red flags regarding cyber security and personnel threats.
Networks whether it be home or business needs safety protocols in place to prevent security breaches. To learn more about Integrating protocols like ZTNA (Zero Trust Network Access) and SaaS (Software as a Service) into framework designs, click the links above.
The OWASP Juice Shop project gives students practice to identify and exploit web vulnerabilities through the use of multiple tools and techniques.
Computer incident response teams, business impact analysis and business continuity plans are needed to ensure businesses have a road map for continued operation in the event of a disruption.
Cyberwar and Cyberdeterrence
Having an understanding of how to classify the actions of malicious threat actors.