top of page


2. Install, configure, and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection systems, intrusion detection systems, firewalls, system hardening, anti-virus tools, patch management, auditing, and assessment
I used Wire shark for analyze the structure of different protocols and has the ability to demonstrate encapsulation.
(NSM PROJECT)
Verifying Active Directory and set up for DNS server configuration. Viewed the disk configuration which helping me to verifying network connectivity.
(Foundations of systems administration)
Objective 2: About
bottom of page