Module 2: Network Security

A 6-Unit Module that Started on June 2022 and was Covered in 6 Weeks by Beran Necat


Overview of Key Tasks and Projects Completed

During this module, I completed a series of tasks and assignments that equipped me with practical skills in cybersecurity and software development.
Below is a summary of the projects, techniques, and security solutions learned throughout the course.

  1. Network Security and Cyber Kill Chain Model
  2. Explored the history of network security and vulnerabilities, analyzing key security incidents from the past and their impact on modern cybersecurity practices.

    Studied and applied Lockheed Martin's Cyber Kill Chain Model to real-world case studies, including the SolarWinds exploit, to understand how advanced persistent threats (APTs) operate.

    Participated in a collaborative discussion on security implications of the digital economy, sharing insights on digitalization risks and mitigation strategies.

  3. Vulnerability Assessments and Breach Analysis
  4. Conducted a vulnerability audit and assessment for a case study on PC Help Me, performing:

    - Testing and scanning using industry-standard vulnerability assessment tools.

    - Analysis of findings to create a structured audit document and security improvement plan.

    - Executive summary outlining key risks and recommendations for mitigation.

    Analyzed major security breaches, including the Adobe data breach, evaluating attack vectors, weaknesses exploited, and countermeasures.

  5. Logging, Forensics, and Incident Response
  6. Examined logging techniques in Windows vs. Linux environments and explored forensic tools for security investigations.

    Reviewed forensic methodologies and tools used for extracting evidence during security incidents.

    Developed an Assessment Reporting Template based on industry best practices to document security findings effectively.

  7. Emerging Trends and the Future of the Internet
  8. Studied next-generation internet technologies, including:

    - Content-centric networking (CCN, NDN, COAST)

    - Peer-to-peer overlay networks (BitTorrent, TOR, Freenet, KAD)

    - MobilityFirst architecture

    - Security enhancements in IPv6 (DNSSEC, HTTP/3, IPsec)

    Participated in a debate on the future of the internet, presenting arguments in favor of peer-to-peer overlay-based networking as the dominant future model.

    Key Tasks and Projects Completed

    The tasks, projects and assignments that equipped me with practical skills in cybersecurity and software development.

    1. Vulnerability Assessments
    2. Did an Assessment (Vulnerability Audit and Assessment - Baseline Analysis and Plan) for https://pchelpme.org.uk case study. Below is the essay that I handed out.

      Download PDF

      As a continuation, I did another Assessment (Vulnerability Audit and Assessment - Results and Executive Summary) for https://pchelpme.org.uk case study.
      Below is the essay that I handed out.

      Download PDF

    3. Breach Analysis and Mitigation Report
    4. Below is my report after analysing the Adobe data breach case study.

      Download PDF

    5. Breach Analysis and Mitigation Report
    6. A group debate on "The Future of the Internet" that we were to second that "It is our belief that the future of the internet is based on peer-to-peer overlay-based networking (BitTorrent, TOR, Freenet, KAD)".
      After a couple of group meetings discussing on the subject above, we presented:

      Download PDF


    7. Final Reflective Piece
    8. Completed a Reflective Essay, discussing the key lessons learned throughout the module and their practical applications in real-world cybersecurity scenarios.

      Download PDF



      Contact

      Please Do Not Hesitate to Contact Me at mutegibeatrice93@gmail.com for more Information