MLDiDomenico.com
MLDiDomenico.com/Portfolio
LABS COMPLETED:
-
Introduction to Operating Systems
-
Computer Security Basics
-
Introduction to Windows 10
-
Linux on Desktop
-
Social Engineering Using SET
-
Creating and Securing User Accounts
-
Implementing Security Policies on Windows and Linux
-
Hardening Windows
-
Types of Networks
-
Hardening Linux
-
Windows Registry
-
Network Management
-
Using Active Directory in the Enterprise
-
Patching, Securing Systems, and Configuring Anti-Virus
-
Desktop Virtualization
-
Using Disk Encryption
-
Local Operating System Exploitation
-
Securing the pfSense Firewall
-
Creating a VPN Connection
-
Configuring a SPAN Port
-
Installing a RADIUS Server
-
Using an IDS
-
Configuring a Wireless Access Point
-
Using Browser Exploitation to Take Over a Host’s Computer
-
The OSI Model
-
TCP/IP Utilities
-
Implementing Secure DHCP and DNS
-
Setting Up an On-Path Attack
-
Launching a DoS Attack
-
Using Hash Functions to Validate Data Integrity
-
Using Public Key Encryption to Secure Messages
-
Assigning NTFS Permissions
-
Deploying a Honeypot
-
Creating a Fault-Tolerant Network
-
Creating Redundant Storage
-
Capturing and Analyzing Network Traffic Using a Sniffer
-
Enumerating Hosts Using Wireshark, Windows, and Linux Commands
-
Remote Access - RDP
-
Introduction to Autopsy Forensic Browser
-
Investigating a Network Compromise
-
Deep Dive in Packet Analysis – Using Wireshark and Network Miner
-
Finding Malicious Indicators
-
Log Analysis in Linux and Splunk
-
Performing Reconnaissance from the WAN
-
Scanning the Network on the LAN
-
Network Exploitation
-
Performing XSS Attacks
-
Performing Injection Attacks
-
Exploiting a Vulnerable Web Application
-
Injection Attacks using WebGoat (OWASP)
-
Vulnerability Scanning of a Linux Target
-
Cracking Passwords on Linux Systems
-
Remote and Local Exploitation
-
Attacking Webservers from the WAN