top of page

Projects

Objective 1: Translate physical and organizational needs into network design(s) that fully address and support logical, physical, and/or virtualized operational requirements.

As the network upgrades continue, management has decided that they will install a new Intrusion Detection/Intrusion Prevention System (IDS/IPS) and upgrade the Firewalls in both the main and branch offices. In addition, Management wants to install a Virtual Private Network (VPN) between the main office and the branch office.

Created for the UAT Course: NTW102—Foundations Of Networking Engineering.

The hands-on final project is a fun, break-fix, configuration and installation activity in Packet Tracer that I provide the final week of class. It is based on the Me, Myself and I network design your assignments have referenced this semester. If you have participated in the previous hands-on Packet Tracer labs, the final will be very familiar.

Created for the UAT Course: NTW216—Foundations Of Networking Engineering.

Objective 2: Implement, support, and evaluate network services (active directory, email, DNS, servers, clients and data storage), routed and switched network infrastructures (wired and wireless) that incorporate networking concepts and industry best practices.

In Lecture 1.3, we introduced the concepts of Incident Response, Business Continuity, Disaster Recovery, Computer Forensics, and Crisis Management.  

Created for the UAT Course: NTS405—Incident Response.

Provides the student the opportunity to learn the current offerings of Microsoft Azure and AD DS and how to apply their knowledge and skills solving real world administration challenges.

Created for the UAT Course: NTW216—Foundations Of Systems Administration.

Objective 3: Design network architectures that incorporate emerging networking technologies. 

Included is a script below that students will analyze, line by line. Conduct a personal analysis of the script by reading through it, running it, and doing some searches on the parts of the script that are not familiar. Try to define what each line of the script is doing.

Created for the UAT Course: NTS370—Shell Scripting For Technologists.

Create 3 Ubuntu Based Linux Virtual Machines on either a cloud provider or locally to your system. Set them up so you can SSH into them. You should be using an SSH key and easily be able to access the machines. 

Created for the UAT Course: NTS336—Cloud Security.

Objective 4: Produce professional and accurate visualizations and documentation related to network architecture and services.

This lab demonstrates actual malware on a virtual machine, and allows you to go through the process of detection and removal.  In contrast to the stealthy operation of most malicious software, and for the sake of this being an introductory course, much of the malware and virus activity is easily observed and located. 

Created for the UAT Course: NTS103—Identity Protection and Personal Security.

In your, Amazon EC2 AWS was going to deploy a Windows Server for future use. 

For your assignment, you will screenshot these steps and submit them to the shell.

Created for the UAT Course: NTS336—Cloud Security.

Objective 5: Given cost and operational parameters, design network, hardware, and system options with evaluations and recommendations of how they meet the requirements of specific projects.

Now that you have installed Active Directory on your Azure Windows Server, we will be setting up the firewall rules in Azure and AWS to ONLY allow communication between the two services. 

Created for the UAT Course: NTS336—Cloud Security.

Now that we have confirmed in class that our subscriptions are working, and you're able to create servers that actually work. It's time to make some servers and join them together. We will be creating an AD server in Azure and another Windows Server in AWS that will be joining that AD Server. 

Created for the UAT Course: NTS336—Cloud Security.

Objective 6: Design and implement a secure network infrastructure using industry best practices.

The first step of any successful social engineering attack is research. You are going to need to figure out how an attacker thinks, and that starts with the war game. You will need to look at multiple companies and begin thinking about what makes them vulnerable.

Created for the UAT Course: NTS310—Social Engineering.

You must learn from the past and protect yourself and others from making mistakes that could have been easily avoided. We should constantly use the power of hindsight to recognize events and their consequences. You can do this by researching previous attacks and learning how they succeeded.

Created for the UAT Course: NTS31—Social Engineering

bottom of page