Posts

Showing posts from June, 2023
 Week 2: Vulnerability Management Activities and Vulnerability Assessment Tools. This week's reading material covered various topics like Service Level Agreements (SLA), vulnerability scanning tools, Common Vulnerability Scoring Systems (CVSS), and vulnerability feeds. In addition, there are various other topics discussed in the chapter reading that are just as important and play an essential role in the cybersecurity analyzing process as the four main discussion topics. As a cybersecurity analyst, you should never always expect to be hundred percent on point all the time because there is no hundred percent right or wrong, especially in the computer networking infrastructure. However, this doesn't mean that as a cybersecurity analyst, you shouldn't give it all the effort you know you are capable of. We live in an information age that requires us to adapt to the content of transformation occurrences. As I stated in my discussion post, we live in a comparative world, and
Image
BSIT380-T301 System Hardening and Network Risk Management.  Week One Introduction. Hello, and welcome to my first blog posting of the week! My name is Edward Cooper, and I was born and raised in Monrovia, Liberia, on the West Coast of Africa. I came to the United States of America in November of 1996 and have been living in New Jersey since. I am a Bellevue University student pursuing my Bachelor of Science in Information Technology, and I look forward to graduating in August of 2024 if everything goes accordingly. I am an employee of Target Corporation, and I am grateful and appreciative for Target giving me the opportunity of going to school on a tuition-free program. My current class concerning this blog posting is BSIT380-T301 System Hardening and Network Risk Management – CompTIA CySA+ Cybersecurity Analyst Certification. I am excited to see what this course has to offer – especially with me having little to no cybersecurity experience. Everything interests me about the cour