top of page

6. Research, document, test, and evaluate several current industry information security based threats, risks, malicious activities, covert methodology, encryption technologies, mitigation techniques or unconventional tactics to prevent loss of sensitive information and data confidentiality, integrity, and availability

In this project, I had to figure out how i want to attack it. with 2 given log files, I need to find out what is going on. 

(NTS350)

The purpose of this project is make familiarize myself with the Security Onion's tools. so far, I tried out with Argus. (NTS350)

Reasearching.PNG

This is one of my researching about current event. Knowing about current event is really important. It can help us know what is important or what we need to be careful with. 

bottom of page