Write-ups & School papers

fly-d-FGH69mi53Mw-unsplash
What are some of the negatives if a firewall is configured too harshly?
The following is a response I gave to the question “What are some of the negatives if a firewall is configured too harshly?” The question is focused on the course that I graduated from at WOZU. So much of the answer is focused on this specific course. But there is also much that can be applied...
book-g63ff0f09f_1280
My must-have Security+ resources
Introduction From truck driver with no I.T experience to Security+ and NOC tech in eight months.   I would like to address my must-haves for the security+ while studying to pass.   Disclaimer just because this worked for me does not mean it will work for everyone. But I believe if you follow closely...
network-gd2e716430_1280
UDP Traffic, The Database, And The NIST Framework
The Questions This is a paper I wrote for my cyber security course at WozU. The questions were as follows. Why would you want to block UDP traffic? Why is the database important? Why is it important to keep logs? What is the NIST Framework? Why would you want to block UDP traffic with snort? UDP (User...
1 2 3

Code

tasks-gaca0ba94e_1280
Git-It-Done my time management app
This time management app was made in Tkinter using python. This was to help manage things I need to do around the house as well as time spent studying. I have plans to work on it and expand in the future.
computer-g457ccfef0_1280
To-do or not to-do list Final
In this final for my python class in my cyber security focus course, I must make a working to-do list. The list must allow me to add and remove items, as well as mark the items complete. To do this I utilized as little code as possible. I created functions that would add and remove from a dictionary...
Heading Image for landing page
Lesson eight Class Inheritance and Polymorphism
1 2