UAT – Objectives

Described below are the objectives for graduation from University of Advancing Technology. Network Security and Technology Forensics each have distinct objectives and must be supported by work completed in various courses.

None of the documents seen here may be utilized for academic or commercial purposes, or presented as your own work. Plagiarism is academically disqualifying and violates ethical codes. If you wish to utilize my documents as a reference, please contact me.

Additionally, no password-protected document will be given to the general public. They are protected for confidentiality of academic resources, employers, or merely the content within. Not all documents are password protected, those documents have a disclaimer in their description.

  • For the portfolio review, the password will be given to the Program Champion out-of-band.

Changelog

5/27/2020: Objectives 1-3 for both NTS and CFR have supporting documentation. All PDFs are watermarked. Also added the above disclaimer about reusing this work.

6/3/2020: Modified the above disclaimer to include information about the password protected documents. Added some objective proofs to round-out the requirements.

6/4/2020: Added the portfolio reel to this page.

6/5/2020: Added NTS Obj 4’s second proof.

B.S. – Network Security

Objective 1: Network Infrastructure Design

Create a network infrastructure design communications document that includes identified hardware components, connections to outside world, identified physical layer connectivity (media), and addressing.

NTW102 – Intro to Networking

NTW216 – Windows Systems Administration

Objective 2: Security Hardware and Software

Install, configure and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection systems, intrusion detection systems, firewalls, system hardening, anti-virus tools, patch management, auditing and assessment.

NTS350 – Network Security Monitoring

Vulnerability Scans of a Private Network

Objective 3: Scripting or Programming

Construct, implement and document a script or a program to automate a security-related process or other task such as installation, administration, management, mapping resources, logon scripts, patch management, updates, auditing, analysis and assessment.

SIP – SpookySOC

My Student Innovation Project is a Python toolkit called “SpookySOC,” which aims to speed up the analyst’s daily workflow pertaining to threat intelligence and OSINT.

Service Desk Toolkit

A small collection of Powershell scripts to assist Service Desk technicians (and their supporting team mates) in simple, daily tasks. There are four scripts currently available, and more on the way.

Objective 4: Long-Term Planning

Create a policy or procedure that addresses events such as: a disaster recovery plan, a business continuity plan, incident response policy, acceptable usage document, information security policy, physical security policy, assessments or troubleshooting procedures.

Threat Intelligence Overview

Objective 5: Ethics and Regulations

Develop a research report or implementation plan concerning legal and ethical best practices and mandated requirements that pertain to information security.

NTS201 – Security Essentials

NTS405 – Incident Response

Objective 6: Current Industry Research

Research, document, test and evaluate several current industry information security based threats, risks, malicious activities, covert methodology, encryption technologies, mitigation techniques or unconventional tactics to prevent loss of sensitive information and data confidentiality, integrity and availability.

NTS350 – Network Security Monitoring

Cyber Defense – T-Mobile’s TPotCE

B.S. – Technology Forensics

Objective 1: Network and Application Impact

Articulate the complexity of and apply thinking skills to how the network and application infrastructure affects technology forensics investigations and incident response procedures.

CFR105 – File Systems and Structures

NTS405 – Incident Response

Objective 2: Forensic Contexts and Artifacts

Identify and apply in a forensics context the various topologies, standards, technologies and protocols employed in computer systems, including file system formats and their attributes.

CFR105 – File Systems and Structures

Cyber Defense – Windows Event Logs Cheatsheet

Objective 3: Deploy Forensic Applications

Evaluate, select, and deploy computer forensic measures for the response, mitigation and analysis of a security incident pertaining to digital artifacts and how information was compromised.

CFR105 – File Systems and Structures

Cyber Defense – Using Splunk and Sigma Rules

Objective 4: Investigative and Legal Aspects

Analyze and evaluate the current investigative and legal aspects of information and computer forensics including electronic discovery, deposition, litigation and corporate personnel processes.

CFR230 – Investigative Techniques

CFR230 – Investigative Techniques

Objective 5: Methods, Strategies, and Techniques

Evaluate and execute the strategies, methodologies, techniques, and state- of-the-art forensics tools for the preservation of digital evidence on computer systems, network systems and other electronic devices.

NTS405 – Incident Response

Objective 6: Chain of Custody Tracking

Create tracking processes to follow the trail of electronic evidence through digital systems, including documentation, formal reporting and presentation.

CFR230 – Investigative Techniques

CFR230 – Investigative Techniques

Portfolio Video Reel

Walk through my portfolio visually, without downloading anything! Get an idea of the work I do, and download the documents you’d like to view afterwards!