Category Archives: IST 894 Portfolio

This is the portfolio of work from my Master’s capstone class

Cyber Range Lab Assignment 4

In this lab we take a look at how Snort rules are written and configured, as well as how to make use of them when they are noisy. We then look at iptables, and configure a local host-based firewall to … Continue reading

Posted in IST 894 Portfolio | Leave a comment

Cyber Range Lab Assignment 3

This lab is titled: Hands-on with Encryption Primitives and Block Cipher Modes of Operation. In it we use and compare four different AES-128 modes of operation in different file types and situations to see which are more secure and which … Continue reading

Posted in IST 894 Portfolio | Leave a comment

Cyber Range Lab Assignment 2

This laboratory exercise is about password auditing and buffer overflows.

Posted in IST 894 Portfolio | Leave a comment

Cyber Range Lab Assignment 1

This laboratory exercise focuses on Linux networking and command line tools.

Posted in IST 894 Portfolio | Leave a comment

Cyber Range Evaluation Report

This report performs a comparative analysis of three commercial cyber range platforms based on a comparison matrix to score them based on their features.

Posted in IST 894 Portfolio | Leave a comment