_____Final Progress Report Guideline_____:
– Learning anything or not
– How make encryption in Kali Linux for any word or phrase
Same as following example:
$6$1YdmuY9n$97rTGAvWrsjG3L4lz5nOVHqCqOC5BkP1q3nlY1YAFZ76SQvfkf9amwlD.3HDa4mVf5HZHoul53GNq4AtZs10M/ = zxcvbn
– How using Steganography using following websites:
http://diit.sourceforge.net/
https://futureboy.us/stegano/
http://steghide.sourceforge.net/
– How Encoding word or phrase using http://rumkin.com/tools/cipher/
– Explain Following Windows operating system security tools are located:
Control Panel and Windows Settings
Administrative Tools
Security and Maintenance
Windows Defender Security Center
Windows Defender Firewall
Windows Update
– Explain how to implement proper file-level permissions on Windows systems:
Purpose, use, and types
Permission inheritance and parent/child relationships
Customization
– Explain how backups function and best-practice backup strategies
Availability and integrity
Major backup techniques and types
Configuration
– Explain how audit logging and system monitoring are performed and configured
Audit logging purpose and configuration
Performance monitoring purpose and configuration