1. Network Defense & Packet Analysis
- Wireshark: Used in Cryin Labs to capture and analyze network traffic. Learned how to examine TCP stream data and identify port scan patterns (SYN, TCP connect, version detection).
- Nmap: Practiced various scanning techniques to discover open ports and services. Understood how attackers fingerprint systems, and how to interpret scan results for vulnerabilities.
- Cisco Packet Tracer: Designed and simulated basic networks to understand how switches and routers communicate. Practiced IP configuration and connectivity testing.
2. Cyber Attack Analysis
- Colonial Pipeline Ransomware Attack (SRA 111): Studied the DarkSide ransomware group and its impact on infrastructure. Mapped the breach timeline and assessed government and corporate response.
- Password Cracking Labs: Built Java-based password checkers with validation rules. Explored basic password protection principles and limitations.
3. System & Infrastructure Security
- Linux Command Line (Bash): Learned foundational CLI navigation and commands. Explored file permissions, process management, and user controls.
- Docker & Container Security: Completed labs deploying services (Nginx, WordPress+MySQL) in Docker containers. Learned how container isolation improves system integrity and performance.
- Active Directory Domain Services (CYRIN): Installed and configured AD on Windows Server. Explored centralized authentication and policy enforcement.
4. Endpoint & Access Management
- Password Security Best Practices: Built multiple versions of password-checking programs to enforce security rules. Learned how to iterate security checks and simulate brute force conditions.
- Account Access Control: Viewed
/etc/shadow
and understood Linux user account hashing and role-based security. - Multi-Page Authentication Concepts: Worked on a Precision Analytics group project to build a portfolio site using semantic HTML, with security-focused design elements in mind (like accessibility and structured layout).
5. Risk Management & Career Skills
- Zero Trust & Defense-in-Depth: In SRA 111 coursework, explored strategies that go beyond perimeter security. Studied policies where no user or device is automatically trusted.
- SPARK Reflections: Gained soft skills like communication, leadership, and cultural awareness, all crucial for roles in cybersecurity where policy and teamwork intersect with technical tasks.
6. Research & Forensics Integration
- Forensics: Latent Print Examiner Role: Connected the precision and chain-of-custody focus of forensic science to the accountability needed in incident response and digital forensics.
- Cybersecurity Research Papers: Wrote on the evolution of CPU architecture and how hardware impacts system security, processing, and overall performance in computing environments.
Tools Practiced:
- Wireshark, Nmap, Cisco Packet Tracer, Docker, Bash, Linux Mint, Windows Server, Visual Studio Code, IntelliJ IDEA, TDX Arena, React.js, Tailwind CSS, Next.js
Concepts Covered:
- Network reconnaissance, packet sniffing, password validation, system hardening, access control, directory services, container security, critical infrastructure protection, technical writing, front-end security, full-stack web architecture, simulation-based learning