kskourtsidis/Google-Cybersecurity-Professional-Certificate-Portfolio
GitHub: kskourtsidis/Google-Cybersecurity-Professional-Certificate-Portfolio
一份基于 Google 网络安全专业证书的实战作品集,展示如何运用 NIST 框架与主流工具完成安全评估与事件响应。
Stars: 1 | Forks: 0
# Google 网络安全专业证书作品集
This repository contains a collection of practical projects and security assessments completed as part of the **Google Cybersecurity Professional Certificate**. These labs demonstrate hands-on experience in threat analysis, incident response, network security, and compliance using industry-standard frameworks and tools.
**🛠️ Technical Skills & Tools**
**Frameworks**: NIST Cybersecurity Framework (CSF), NIST SP 800-53, NIST SP 800-88.
**Technical Skills**: SQL (Data Filtering), Linux (Command Line, Permissions), Network Traffic Analysis.
**Security Concepts**: Incident Response, Vulnerability Management, Risk Assessment, Network Hardening, Asset Management.
**Tools**: Bash, SQL, Wireshark, Tcpdump.
**📁 Key Projects**
**1. Incident Response & Network Security**
**Applying the NIST CSF to an ICMP Flood Attack**: Applied the NIST Cybersecurity Framework to analyze and respond to a Denial of Service (DoS) attack.
**Identifying and Responding to a TCP SYN Flood Attack**: Investigated network traffic patterns to identify malicious SYN packets and implemented mitigation strategies.
**Investigating a Brute Force Attack**: Analyzed logs to detect unauthorized access attempts and malicious redirection.
**2. Governance, Risk, and Compliance (GRC)**
**Security Risk Assessment & Network Hardening**: Conducted a comprehensive risk assessment for an enterprise environment and proposed hardening techniques to reduce the attack surface.
**Vulnerability Assessment and Risk Analysis**: Analyzed system vulnerabilities and prioritized remediation efforts based on risk impact and exploitability.
**Enterprise Risk Assessment and Register**: Developed a risk register to track, categorize, and manage organizational security threats.
**3. Technical Foundational Skills**
**Applying Filters to SQL Queries**: Utilized SQL to filter and retrieve specific security-related data from databases for incident investigation.
**File Permissions in Linux**: Managed user access and system security by configuring advanced Linux file permissions via the CLI.
**Analyzing Network Communication & DNS Troubleshooting**: Diagnosed connectivity issues and analyzed DNS traffic to ensure secure and reliable network operations.
**📝 About this Portfolio**
Each folder includes the necessary documentation and scenario details regarding the methodology and tools used. This portfolio serves as evidence of my ability to identify, protect, detect, respond to, and recover from cybersecurity incidents.
标签:DoS防御, Google Cybersecurity Professional Certificate, GPT, meg, NIST CSF, NIST SP 800-53, NIST SP 800-88, SYN Flood防御, Wireshark抓包, 企业风险管理, 信息安全, 免杀技术, 合规, 命令行安全, 多线程, 威胁分析, 安全运营, 应用安全, 扫描框架, 数据库查询, 暴力破解检测, 权限管理, 模型越狱, 漏洞管理, 网络加固, 网络安全, 网络安全框架, 网络流量分析, 自动化侦查工具, 资产管护, 隐私保护, 风险测评, 风险登记