These artifacts show how I would respond to a incident and conduct vulnerability analysis.
This paper shows my knowledge of Locard's Excahnge Principle.
This paper show my knowledge of wireshark.
This paper shows my ability to conduct a forenesic teardown of a computer.
This Paper shows my ability to conduct a forensic anaysis of vulnerabilities.
This paper shows how i would manage a cyber security memory breach
This paper shows my contingency planning abilities.