This Repo documents my reading notes and assignments for CodeFellows Ops 102-201-301-401
Ops 102: Intro to Computer Operations October,15,2023
- Day 1.1 - China's spy kit
- Day 1.2 - How to build a computer
- Day 2.1 - Startup sequences and bios
- Day 2.2 - Ubuntu
- Day 3.1 - Linux command line
- Day 3.2 - The WRT54GL
- Day 4.1 - SSH Protocol
- Day 4.2 - What is an ISO profile
- Day 5.1 - Command Prompt: What it is and how to use it
Ops 201: Foundations of Computer Operations
Octoer,23,2023
- Day 1 - Backup Your System
- Day 2 - What is Bash
- Day 3 - Introduction to Help Desk Support Roles
- Day 4 - Troubleshooting Techniques
- Day 5 - Windows Commands
- Day 6 - Windows Security Center
- Day 7 - OS upgrade and remote access
- Day 8 - System Log Analysis, Registry, Control Panel
- Day 9 - Workstation Deployment SOP
- Day 10 - Imaging, Backup and Recovery
- Day 11 - Data Restoration, Startup Repair, and Secure Disposal
- Day 12 - Virtualizing a Router with pfSense
- Day 13 - Cloud Virtualization with AWS
- Day 14 - Malware Remediation Tools and Techniques
- Day 14 - What Google Learned From Its Quest to Build the Perfect Team
Ops 301 Networking and System Administration
November,26,2023
- Day 1 - Network Traffic Analysis with Wireshark
- Day 2 - Network scanning with NMAP
- Day 3 - Network Segmentation
- Day 4 - Routing
- Day 5 - VPN Tunnels
- Day 6 - NAT(Network Address Protocol)
- Day 7 - Web Server Deployment
- Day 8 - RADIUS Authentication
- Day 9 - Network Mirroring
- Day 10 - VPC
- Day 11 - Windows Server
- Day 12 - Domain Controller
- Day 13 - Active Directory
- Day 14 - Group Policy, Diversity
- Day 14 - Diversity & Inclusion in the Tech Industry
Ops 401: Security Engineering
- Read 1 - Strategic Policy Development
- Read 2 - Cloud security principles and framework
- Read 3 - Risk Analyst
- Read 5 - Center Of Internet Security
- Read 6 - Data File Encryption
- Read 7 - Protect Data at rest with device encryption
- Read 9 - Public Key Infrastructure(PKI)
- Read 11 - Setting up Splunk SIEM
- Read 12 - What is a SOC
- Read 13 - Reconstructing a Cloud Attack with Splunk
- Read 14 - Intrusion Detection and Prevention Systems (IDS/IPS)
- Read 16 - Cloud Identity abd Access Management (IAM) with AWS
- Read 17 - Cloud Network Security
- Read 18 - Logging and Monitoring
- Read 19 - AWS GuardDuty
- Read 26 - Remote Code Execution
- Read 27 - Persistence
- Read 28 - Log Clearing
- Read 29 - Threat Modeling
- Read 31 - YARA Rules
- Read 32 - Malware Analysis
- Read 36 - XSSS
- Read 37 - ZAP
- Read 38 - Burp Suite
- Read 39 - SQL INJECTION
- Read 41 - Reconnaissance
- Read 42 - Mimikatz
- Read 43 - Sniffing
- Read 44 - Metasploit