Overview of Key Tasks and Projects Completed
During this module, I completed a series of tasks and assignments that equipped me with practical skills in cybersecurity and software development.
Below is a summary of the projects, techniques, and security solutions learned throughout the course.
Explored the history of network security and vulnerabilities, analyzing key security incidents from the past and their impact on modern cybersecurity practices.
Studied and applied Lockheed Martin's Cyber Kill Chain Model to real-world case studies, including the SolarWinds exploit, to understand how advanced persistent threats (APTs) operate.
Participated in a collaborative discussion on security implications of the digital economy, sharing insights on digitalization risks and mitigation strategies.
Conducted a vulnerability audit and assessment for a case study on PC Help Me, performing:
- Testing and scanning using industry-standard vulnerability assessment tools.
- Analysis of findings to create a structured audit document and security improvement plan.
- Executive summary outlining key risks and recommendations for mitigation.
Analyzed major security breaches, including the Adobe data breach, evaluating attack vectors, weaknesses exploited, and countermeasures.
Examined logging techniques in Windows vs. Linux environments and explored forensic tools for security investigations.
Reviewed forensic methodologies and tools used for extracting evidence during security incidents.
Developed an Assessment Reporting Template based on industry best practices to document security findings effectively.
Studied next-generation internet technologies, including:
- Content-centric networking (CCN, NDN, COAST)
- Peer-to-peer overlay networks (BitTorrent, TOR, Freenet, KAD)
- MobilityFirst architecture
- Security enhancements in IPv6 (DNSSEC, HTTP/3, IPsec)
Participated in a debate on the future of the internet, presenting arguments in favor of peer-to-peer overlay-based networking as the dominant future model.
Key Tasks and Projects Completed
The tasks, projects and assignments that equipped me with practical skills in cybersecurity and software development.
Did an Assessment (Vulnerability Audit and Assessment - Baseline Analysis and Plan) for https://pchelpme.org.uk case study. Below is the essay that I handed out.
Download PDFAs a continuation, I did another Assessment (Vulnerability Audit and Assessment - Results and Executive Summary) for https://pchelpme.org.uk case study.
Below is the essay that I handed out.
Below is my report after analysing the Adobe data breach case study.
Download PDFA group debate on "The Future of the Internet" that we were to second that "It is our belief that the future of the internet is based on peer-to-peer overlay-based networking (BitTorrent, TOR, Freenet, KAD)".
After a couple of group meetings discussing on the subject above, we presented:
Completed a Reflective Essay, discussing the key lessons learned throughout the module and their practical applications in real-world cybersecurity scenarios.
Download PDF