Home
Cyber Work Samples
Threat Analysis

Home
Cyber Work Samples
Threat Analysis
More
  • Home
  • Cyber Work Samples
  • Threat Analysis

  • Home
  • Cyber Work Samples
  • Threat Analysis

Cyber Work Samples

Below are some assignments/projects completed during the 

University of Denver Cybersecurity Bootcamp with an "A" average.

More details at LinkedIn.

Threat Intelligence Analysis

Assessing Security Culture of BYOD & Creating a User Training Plan

Assessing Security Culture of BYOD & Creating a User Training Plan

I am fascinated with threat intelligence and try to keep up as best as I can. This assignment required reviewing a number of threat intelligence reports and taking a quiz. 

Here are some interesting reports: Mandiant

Verizon

Crowdstrike

Splunk

Assessing Security Culture of BYOD & Creating a User Training Plan

Assessing Security Culture of BYOD & Creating a User Training Plan

Assessing Security Culture of BYOD & Creating a User Training Plan

My paper identifies the issues with Bring Your Own Device (BYOD) and follows with a user training plan. The plan details who, in the organization, should be involved; and recommends a training plan and follow-on steps. 


See the analysis and 

training plan here.

Threat Identification

Assessing Security Culture of BYOD & Creating a User Training Plan

Threat Identification

Hired by Lucky Duck Casino as a security analyst. Lucky Duck has lost a significant amount of money on the roulette tables. They believe there is a player working with a Lucky Duck dealer to steal money at the roulette tables. Tasked with navigating, modifying, and analyzing these data files to gather evidence on the rogue player and deal. See the Bash code here.

Penetration Testing & Report

Penetration Testing & Report

Penetration Testing & Report

Tasked with performing penetration testing of a fake company and providing a report suitable for the technical leadership as well as the business leadership.


See the report here.

SOC Analysis (SIEM)

Penetration Testing & Report

Penetration Testing & Report



See the Splunk work here.

Web Application & Discussion

Penetration Testing & Report

Web Application & Discussion

Created a web application using Azure. Discussion of DNS lookup, runtime stack, cloud tenant, key vault, certificate, SSL off-loading.


See assignment here.

Cloud Infrastructure Diagramming

Defensive Security - Windows Analysis

Cloud Infrastructure Diagramming


Diagram a network using draw.io.

See the map here.


Dive into Bluetooth Hacking

Defensive Security - Windows Analysis

Cloud Infrastructure Diagramming


Read about it here.

Defensive Security - Windows Analysis

Defensive Security - Windows Analysis

Defensive Security - Windows Analysis


Analysis here.


Additional assignments involved performing tasks using Burp Suite, Nessus, Linux System Administration, Wireshark, and more... 

were then quizzed and so no project artifacts resulted to post here.

Copyright © 2024 Aaron Miller Cybersecurity Professional - All Rights Reserved.

Powered by GoDaddy

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept