As I progress on my path toward cybersecurity expertise, I’ve drawn on a variety of resources to sharpen my skills. One of the key programs I’m completing is the Google Cybersecurity course, where I’ve successfully covered several important modules:
Tools of the Trade: Linux and SQL
Connect and Protect: Networks and Network Security
Play It Safe: Manage Security Risks
Foundations of Cybersecurity
While penetration testing can be an exciting part of cybersecurity, it’s essential to organize and present the findings in a way that clients can easily grasp. Many business owners might not be very tech-savvy, so they need to clearly understand how vulnerabilities could impact their operations.
In cybersecurity, assessments and reports are a regular part of the job. Today, I’m working on a vulnerability assessment report. This report aims to analyze a vulnerable system within a small database and outline the risks, along with a plan for remediation.
For this, I’m recommending key practices such as:
The Principle of Least Privilege
The AAA Framework and Defense in Depth
Multi-Factor Authentication (MFA)
These exercises are not only practical for my learning but will also serve as valuable references for my future role. Writing reports like these is good preparation, as I expect they’ll be a daily part of my work in cybersecurity