Labs          

Networking Fundamentals

Skills: Troubleshooting system performance, Maintaining IT Systems, Troubleshooting network equipment, Conducting functional connectivity testing, Performing network traffic analysis, Configuring network devices, Troubleshooting hardware/software interface and interoperability problems, Configuring software-based computer protection tools, Securing network communications, Troubleshooting computer networks, Troubleshooting failed system components, Operating network systems, Developing group policies and access control lists, Reviewing logs, Configuring software, Identifying anomalous network activity.

In this course, I learned the fundamentals of networking from a cybersecurity perspective by working directly with real tools and configurations. I explored how data moves across networks using models like OSI, analyzed live traffic with Wireshark, and built simulated networks in Cisco Packet Tracer. I configured switches and routers using Cisco IOS, practiced subnetting and network design, and set up routing with OSPFv2 to understand how traffic flows between systems.

Microsoft Security system Administration

Skills: Install Systems and servers, Operating IT systems, Maintaining Directory Services, Creating automated security control systems, Maintaining directory services, Developing group policies and access control lists, Configuring software-based computer protection tools, Managing computing environment system operations, administering operating systems, administering system and network user accounts, Writing code, assassing security controls, configuring computer protection components,

In this course, I learned how Microsoft environments are managed and secured from both the server and client sides of a domain. I worked with Active Directory and built-in Windows administration tools to understand how users, permissions, and group policies are created and enforced, and explored common domain services like DNS and DHCP to see how systems communicate and authenticate within a network.

Integrating infrastructure security

Skills: Managing account access rights, performing log file analysis, manipulating operating system components, administering system and network user accounts, diagnosing network connectivity problems, implementing established network security practices, intrusion data analysis, analyzing software configurations, configuring software, testing network infrastructure, including software and hardware devices, determining adequacy of access controls, developing virtual machines, establishing enterprise information security architecture, administering operating systems.

In this course, I built a practical understanding of Linux by working directly with the command line and core system administration tasks. I learned how Linux systems are managed, configured, and maintained, and explored how Linux is used in modern environments, including cloud fundamentals and serverless computing concepts.

Securing your netowrk

Skills: Reconstructing a network, Determining adequacy of access controls, Identifying vulnerabilities, researching software exploits, assessing application vulnerabilities, Determining if baseline security safeguards are appropriately installed, implementing one-way hash functions, configuring network hardware, deploying continuous monitoring technologies, Performing continuous monitoring of system activity, Performing data analysis, Performing network traffic analysis, Configuring network devices, Reconstructing a network, Assessing security controls, Securing Network communications, Identifying potential threats to network resources, Validating network alerts, Developing security system controls, Implementing new system design procedures, Testing network infrastructure including software and hardware devices, Patching network vulnerabilities, Deteecting Cybersecurity attacks and intrusions, Constructing cyber defense network tool signatures.

In this course, I learned how modern networks are protected and monitored from a security perspective. I built an understanding of core network security concepts, including cryptographic models, traffic analysis, and VPN technologies, and explored how different types of network attacks are detected and mitigated.

Designing Cybersecurity Infrastructure

Skills: Determining the operational and safety impacts of cybersecurity lapses, Performing malware analysis, Distinguishing between benign and potentially malicious cybersecurity attacks an intrusions, developing signatures, evaluating security products, identifying digital evidence for analysis, Patching network vulnerabilities, implementing established security practices, executing command line tools, identifying potential threats to network resources, Performing network traffic packet analysis, Deploying continuous monitoring technologies, performing log file analysis, performing continuous monitoring of system activity, performing event correlation, analyzing traffic associated with malicious activities, developing technical reports, tracking cyber defense incidents from initial detection through final resolution, determining effectiveness of enterprise cybersecurity safeguards, performing system activity analysis, performing trend analysis, Correlating incident data, detecting cybersecurity attacks and intrusions, performing continuous monitoring of system activity, analyzing large data sets, performing digital forensics analysis, Identifying vulnerabilities, Identifying forensics data in diverse media, performing malware analysis, evaluating security designs, configuring network devices, reconstructing a network, determining adequacy of access controls, assessing security controls,

In this course, I learned how modern cybersecurity infrastructure is designed and integrated across enterprise environments. I explored how security tools like endpoint detection and response, patch management systems, and email security fit into a broader defensive strategy, and studied how SIEM and SOAR platforms are used to centralize visibility and automate response.

social engineering and ethical hacking

Skills: Researching software vulnerabilities and exploits, Identifying vulnerabilities, Protecting a network against malware, performing static malware analysis, Scanning for vulnerabilities, Performing authorized penetration testing on enterprise network assets, analyzing software configurations, performing network data analysis, performing intrusion data analysis, performing target analysis, Performing data analysis, Assessing an organizations thread environment, Conducting technical exploitation of a target, performing penetration testing, Analyzing software configurations, configuring software-based computer protection tools, Determining the operational and safety impacts of cybersecurity lapses, Evaluating organizational cybersecurity policy regulatory compliance, performing risk assessments, reviewing logs

In this course, I learned how common cyber attacks are carried out and how those techniques inform defensive strategies. I explored topics like network scanning, social engineering, OSINT, and brute-force attacks to understand how systems are probed, exploited, and tested in real-world scenarios.

digital forensics and incident response

Skills: Determining relevance of recovered data, Utilized deployable forensics toolkit, extracting forensics data in diverse media, performing digital evidence analysis, extracting metadata, continuous monitoring of system activity, performing static malware analysis, Identifying malware, collecting digital evidence, performing digital evidence analysis, Identifying digital evidence for analysis, processing digital evidence, performing network traffic analysis, reviewing logs, Distinguishing between benign and potentially malicious cybersecurity attacks and intrusions, Documenting digital evidence, scanning digital media for viruses, performing digital forensics analysis, Identifying evidence of past intrusions, setting up forensic workstations, reporting forensic artifacts indicative of a particular operating system, processing forensic images.

In this course, I learned the fundamentals of digital forensics and incident response by working through how security incidents are investigated from start to finish. I built a foundational understanding of DFIR concepts and frameworks, then applied that knowledge through hands-on investigation work and real-world case studies.

Threat hunting and intelegence

Skills: assessing security controls, preparing reports, reviewing logs, performing network data analysis, analyzing large data sets, developing analytics, creating analytics, scanning for vulnerabilities, developing signatures, establishing enterprise inflammations security architecture, managing computing environment system operations, administering operating systems, developing cybersecurity policy recommendations, analyzing network traffic associated with malicious activities, performing digital forensics analysis, performing malware analysis, Identifying anomalous network activity.

In this course, I developed a broad understanding of cybersecurity concepts, ranging from foundational principles to more advanced defensive strategies. I explored how threats are identified, analyzed, and managed, including long-term and advanced persistent threats, while connecting theory with hands-on activities and real-world examples.

INtroductory

Skills: Identifying Vulnerabilities, Performing Intrusion data analysis, Determining relevance of recovered data, performing static malware analysis, developing cybersecurity policy recommendations, conducting risk assessments, performing data analysis, executing command line tools, optimizing network hardware, administering operating systems, managing servers, managing account access rights, monitoring systems and server configurations, implementing protective and corrective measures post-incident or vulnerability, Identifying vulnerabilities, conducting risk assessments, performing packet-level analysis performing network data analysis, scanning for vulnerabilities, performing authorized pen testing on enterprise network assets.

These Labs were part of the first month of class. They were designed just to get your feet wet in cybersecurity. The topics were covered again in the classes above more in depth that’s why it’s down here and not first.