


Vulnerability Scanning With Nessus
Portfolio Cybersecurity Vulnerability Scanning With Nessus I created this home lab as a way to gain experience doing vulnerability scans using Nessus Essentials by Tenable. Nessus is a freemium vulnerability scanning tool that allows one to scan the devices on their...
Security Audit
Portfolio Cybersecurity Security Audit Lab The purpose of this lab is to gain a familiarity with the internal security audit process of a hypothetical organization. Audits are useful to assess the security of an organization’s security controls and environment,...
Incident Report Analysis
Portfolio Cybersecurity Incident Report Analysis In this lab I will be analyzing a fictitious network incident using the National Institute of Standards and Technology’s Cybersecurity Framework (NIST CSF). The CSF is a popular framework that consists of...
Recent Comments