Updated Security Plan For Tread Movement
This document aligns with the objective by outlining the use of security tools such as firewalls, IDS/IPS, antivirus, and encryption. It includes vulnerability assessments, patch management, and auditing, showing how security systems are installed, configured, and tested to protect organizational assets.
Click Image to Download
IoT Network Analysis Video
The IoT Network Analysis video relates to the objective by showing network segmentation used to separate IoT devices for security testing. It demonstrates how vulnerability detection, monitoring, and assessment tools verify that segmented networks reduce exposure to cyber threats while maintaining secure communication between devices.
Click Image to Download
Setting Up a UFW
This document supports the objective through the installation and configuration of firewall software (UFW). It demonstrates practical application of system hardening and traffic control, ensuring that unauthorized network access is blocked and the system remains secure.
Click Image to Download
Install, configure and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection systems, intrusion detection systems, firewalls, system hardening, anti-virus tools, patch management, auditing and assessment.



