top of page
NICE-Meeting1.png

Lab Assessments

NICE performance_report image_Page_1.jpg

A summary report of all the NICE Challenge labs I completed for Ethical Hacking and Systems Defense.

Each NICE Challenge has the following core elements: a narrative-driven scenario, a business environment (workspace), and a set of technical objectives and/or a written deliverable. Each of these elements is developed to immerse the player (student) in a real-world experience and create a valuable set of data allowing their curator (educator) to judge their readiness for the workforce.

A NICE Challenge with 8 cybersecurity countermeasures that must be implemented.
These countermeasures include creating and enforcing GPO, enabling application identification services, and using AppLocker to deny access. This Lab report documents my effectiveness as a Systems Security Analyst to implement these countermeasures.

NICE Challenge volatile vulnerabilities.png
NICE Challenge Calamitous Configurations.png

A NICE Challenge with 7 misconfigurations that must be identified and remedied.

These include disabling Telnet and FTP features, removing improper firewall rules, and configuring SSH authentication. This Lab report documents my effectiveness as a System Administrator in ensuring baseline system security.

A NICE Challenge with tasks geared towards enhancing the security of Internet Explorer and Windows servers using Group Policy settings.

NICE Challenge Group Policy Protections.png
INFOSEC Learning.png

"Throughout this learning path, we will be covering the fundamentals of wireless network security, firewalls and IDS/IPSes, VPNs and how users access your network remotely, endpoint security, preventing and mitigating network attacks, and some best practices related to securing your network. This learning path is designed to get you up to speed on how to secure your organization's network as quickly as possible."
 

https://www.infosecinstitute.com/skills/learning-paths/network-security-fundamentals/

bottom of page