joshblack07
I am currently a Security Operations Specialist who recently completed the University of Richmond Cyber Security Bootcamp. Email: joshblack07@gmail.com
Richmond, VA
Pinned Repositories
ELK-Stack-Project
The ELK Stack project built upon resources developed within the Cloud Security unit. This repository is a basic explanation of the process involved with recreating this environment.
FinalProject
Cybersecurity Bootcamp Project
ShieldsUp
Summary: The Cybersecurity and Infrastructure Security Agency CISA leads the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure. In response to the Russian Invasion of Ukraine, CISA has been closely monitoring the increased malicious cyber activity and has developed strategies to help mitigate the risk to organizations.
UR-Cyber-Security-Capstone-3
Summary: This capstone outlines the process a security engineer would use to set alerts and analyze traffic using various systems. Vulnerable machines are attacked to test the alerts and produce auditable traffic.
UR-Cyber-Security-ELK-Stack-Project
The ELK Stack project built upon resources developed within the Cloud Security unit. The ELK server is designed to monitor the performance of multiple virtual machines in one database.
UR-Cyber-Security-Red_vs_Blue
Assessment, Analysis, and Hardening of a vulnerable system. This report includes a Red Team Security Assessment, a Blue Team Log Analysis, and Hardening and Mitigation Strategies.
Vulnerability_PoC
Challenge: Find out about the website's security vulnerabilities and send their 3 high-risk vulnerabilities along with PoC (Proof of Concept).
joshblack07's Repositories
joshblack07/UR-Cyber-Security-Red_vs_Blue
Assessment, Analysis, and Hardening of a vulnerable system. This report includes a Red Team Security Assessment, a Blue Team Log Analysis, and Hardening and Mitigation Strategies.
joshblack07/UR-Cyber-Security-Capstone-3
Summary: This capstone outlines the process a security engineer would use to set alerts and analyze traffic using various systems. Vulnerable machines are attacked to test the alerts and produce auditable traffic.
joshblack07/Vulnerability_PoC
Challenge: Find out about the website's security vulnerabilities and send their 3 high-risk vulnerabilities along with PoC (Proof of Concept).
joshblack07/ELK-Stack-Project
The ELK Stack project built upon resources developed within the Cloud Security unit. This repository is a basic explanation of the process involved with recreating this environment.
joshblack07/FinalProject
Cybersecurity Bootcamp Project
joshblack07/ShieldsUp
Summary: The Cybersecurity and Infrastructure Security Agency CISA leads the national effort to understand, manage, and reduce risk to our cyber and physical infrastructure. In response to the Russian Invasion of Ukraine, CISA has been closely monitoring the increased malicious cyber activity and has developed strategies to help mitigate the risk to organizations.
joshblack07/UR-Cyber-Security-ELK-Stack-Project
The ELK Stack project built upon resources developed within the Cloud Security unit. The ELK server is designed to monitor the performance of multiple virtual machines in one database.