Managing risk to information assets. Business strategy –> IT strategy All managers need to work together on the overall plan. Planning (strategic, tactical and operational) […]
Author: Stef
Vulnerability Assessment
FOOTPRINTING: Online search. Employee directories, locations,… for social engineering or tech attack Source Code Business/Gov websites with info on management team and financial holding WHOIS […]
Microsoft Cybersecurity Analyst Professional Certificate – Course 3: Threat vectors and mitigation – Final course project
Sam’s Scoops has experienced substantial expansion. Operating across multiple locations, Sam’s Scoops deals with sensitive customer data, including credit card information, addresses, and personal details. […]
Project: Network segmentation
As part of the Microsoft Cybersecurity Analyst Professional Certificate, the following exercise was to be completed. Imagine you are a part of the IT team […]
Fundamental cybersecurity measures
Securing data requires a comprehensive approach to mitigate all possible vulnerabilities. Areas to make sure to cover are: SECURITY POLICIES INFRASTRUCTURE PHYSICAL MACHINES LAST BUT […]
Microsoft Cybersecurity Analyst Professional Certificate and Capstone Project
Having just completed this certification, I wanted to reflect on my experience and discuss the capstone project that was required to complete the course (that […]
whoami
I’m an IT professional and cybersecurity student, working to develop my skills as a cybersecurity professional. I am particularly interested in blue and purple team operations, and would especially like to get into GRC. Not only, I think I would be a great fit, due to my blend of technical knowledge and experience in business!