Final Network Design and Executive Summary Executive Summary As organizations continue to expand in contemporary corporate society, so does the rise in the use of information systems and the...
Latest News - IT management
Security in SDLC versus Agile Application Security Effort SDLC has more security effort compared to Agile (Assal & Chiasson, 2018). This is because security is involved in several steps of SDLC...
System Scan Report This report is a penetration testing report that involves scanning a system or operating systems for vulnerabilities. The host machine is a Linux operating machine hosted on a...
Application Security-Security Awareness Consequences to the Organization It is better to implement cybersecurity measures than deal with security incidents. Training employees is one way of...
Password Policy and Automation Password automation is an essential practice that companies use to ensure data protection. Password hardening gets away with weak passwords. Password-based threats are...
Practical Connection- Windows Security This course was one of my most interesting and applicable courses in this session. Based on the skills gained, I can implement and maintain Windows security...