MY SITE
  • Home
  • Projects
  • SIP
  • About
  • Contact

My Work
This is where my projects can be discovered. These projects are the work that I have accomplished within my career thus far

Contact Me

My Network Infrastructure Design
Create a network infrastructure design communications document that includes identified hardware components, connections to outside world, identified physical layer connectivity (media) and addressing, including operational and security components in the design​
san_integration.vsdx
File Size: 99 kb
File Type: vsdx
Download File

basicinfrastructure.vsdx
File Size: 58 kb
File Type: vsdx
Download File

Tools Installation, Configuration & Testing
Install, configure and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection systems, intrusion detection systems, firewalls, system hardening, anti-virus tools, patch management, auditing and assessment
securityoniontools.docx
File Size: 2410 kb
File Type: docx
Download File

stecki_final_nsm_project.docx
File Size: 833 kb
File Type: docx
Download File

Security Scripting
Construct, implement and document a script or a program to automate a security-related process or other tasks such as installation, administration, management, mapping resources, logon scripts, patch management, updates, auditing, analysis and assessment​
shellscript1.png
File Size: 156 kb
File Type: png
Download File

shellscript2.png
File Size: 132 kb
File Type: png
Download File

Incident Response/Disaster Recovery Plan
Create a policy or procedure that addresses events such as: a disaster recovery plan, a business continuity plan, an incident response policy, an acceptable usage document, an information security policy, a physical security policy, assessments or troubleshooting procedures​
incidentresponse.vsdx
File Size: 55 kb
File Type: vsdx
Download File

stecki-response_concept.docx
File Size: 85 kb
File Type: docx
Download File

Legal & Ethical Practices
​
Develop a research report or implementation plan concerning legal and ethical best practices and mandated requirements that pertain to information security
ibm_v_papermaster.docx
File Size: 17 kb
File Type: docx
Download File

stecki_neurohacking.pptx
File Size: 797 kb
File Type: pptx
Download File

Vulnerability Research & Testing
Research, document, test and evaluate several current industry information security based threats, risks, malicious activities, covert methodology, encryption technologies, mitigation techniques or unconventional tactics to prevent loss of sensitive information and data confidentiality, integrity and availability​
nts435_final_presentation.pptx
File Size: 341 kb
File Type: pptx
Download File

stecki-kyle-labs-threats.docx
File Size: 324 kb
File Type: docx
Download File

Powered by Create your own unique website with customizable templates.
Photo used under Creative Commons from Free Public Domain Illustrations by rawpixel
  • Home
  • Projects
  • SIP
  • About
  • Contact