top of page


2. Install, configure, and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection systems, intrusion detection systems, firewalls, system hardening, anti-virus tools, patch management, auditing, and assessment
I used Wire shark for analyze the structure of different protocols and has the ability to demonstrate encapsulation.
​
(NSM PROJECT)
Verifying Active Directory and set up for DNS server configuration. Viewed the disk configuration which helping me to verifying network connectivity.
​
(Foundations of systems administration)
Objective 2: About
bottom of page