This course provided a comprehensive survey of the tools, techniques, and methodologies used by IT and cybersecurity professionals across both blue team (defense) and red team (offense) operations. The course included weekly labs, scripting assignments, and a final project focused on applying layered security strategies in real-world scenarios.
netstat
, tracert
, nbtstat
, grep
, awk
, sed
.Applied defense-in-depth principles and offensive testing techniques in a virtual lab environment, simulating real-world attack and defense scenarios:
Sharpened my ability to select and apply the right security tools for threat detection, system hardening, network analysis, and ethical attacks. Gained strong technical and strategic skills in both blue and red team operations.