SEC 285 FINAL
- Created By Hansel Reynoso
- Professor Burton Piper
- Date 6/7/2023
- Technologies Used LINUX VM, KALI VM, UBUNTU VM, MS AUTH ETC...
In the Network Security course (SEC285), our capstone project involved setting up a secure network environment, identifying and mitigating potential vulnerabilities using tools like Nmap and Wireshark. We implemented robust security measures such as multi-factor authentication, data encryption with GNU Privacy Guard (GPG), and established a Bring Your Own Device (BYOD) policy.