top of page

2. Install, configure, and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection systems, intrusion detection systems, firewalls, system hardening, anti-virus tools, patch management, auditing, and assessment

I used Wire shark for analyze the structure of different protocols and has the ability to demonstrate encapsulation. 

​

(NSM PROJECT)

Verifying Active Directory and set up for DNS server configuration. Viewed the disk configuration which helping me to verifying network connectivity.

​

(Foundations of systems administration)

Objective 2: About
bottom of page