top of page
This site was designed with the
.com
website builder. Create your website today.
Start Now
NATASHA BADGELEY
Home
About Me
Resume
Courses
CRJS
CYSE
LeADERS
Leaders Reflection
Capstone Summer 2024
Applied Work-Based Learning
Diversity
Writing
Research
Contact
More
Use tab to navigate through the menu items.
All Posts
Criminal Justice
Cybersecurity
Social Inequality
Natasha BADGELEY
Mar 13, 2024
1 min read
Collecting Incident Response Data
In Incident response data by collecting the state of the machine which includes the date, time, open ports, IP address configuration,...
Natasha BADGELEY
Mar 13, 2024
1 min read
Launching an Attack
The first step in a brute force attack is to plan the attack. After planning, the attacker can use scanning tools like nmap and zenmap to...
Natasha BADGELEY
Mar 13, 2024
1 min read
Backing up the pfSense Firewall
In a modern IT department, a backup is a copy of data (files, databases, configurations, etc.) that is stored in a place so it can be...
bottom of page