top of page

BRIAN WHIPP CYBERSECURITY

(New photo coming soon)

Welcome to my Cybersecurity blog!

I recently completed the University of Texas at Austin's six month cybersecurity boot camp and am looking forward to beginning my career in the industry.

Before taking this course I worked in IT for several years, and prior to that I worked in mobile app development.  I completed my bachelors degree in 2007 from Loyola Marymount University with a major in animation and a minor in computer science, and worked for several years in the Animation / Visual Effects industry after I graduated.

Network Security Strategies

What is segmentation in cybersecurity?
What is containment in cybersecurity?
What is isolation in cybersecurity?
What is black holing in cybersecurity?

Security Policies, Standards and Compliance

What is ISO 27001
What is ISO 27002
What is ISO 27701?
iso31000.png
ISO 27001, ISO 27002, ISO 27701, ISO 31000
SOC 2 Type II, SOC 1, SOC 3, SOC 2, System and organization controls, AICPA

ORDER OF VOLATILITY

Digital Forensics Order of Volatility, CPU cache and registers, Routing table, ARP cache, process table, kernel statistics, system memory - ram, temporary files and swap space, data on the hard disk, remote logs, backups
Detailed Order of Operations Chart Sheet, CPU Cache and registers, routing table, ARP cache, process table, kernel statistics, system memory - ram, temporary files and swap space, data on the hard disk, remote logs, backups

Data Roles:

Data Owner, Data Steward, Data Custodian, Data Controller, Data Processor, Data Protection Officer
DPO_privacyOfficer_controller.png

Data Classifications

Data Classifications: Public Data, Private Data, Sensitive Data, Confidential Data, Critical Data, Proprietary Data

Access Control Types:

Access Control Types, Role Based Access Control, Rule Based Access Control, Discretionary Access Control, Mandatory Access Control, Attribute Based Access Control

UT Austin Cybersecurity Bootcamp Final Presentation

Our final project for the UT Austin boot camp was to give an in-class presentation showing either a cybersecurity tool not covered in class, an exploit or vulnerability, or to design code to accomplish a cybersecurity goal.

For my presentation I teamed up with two of my fellow classmates, Angel Aguilar and Milo Williams to do a presentation on Bluetooth Technology.

For my portion, I briefly went over the background of Bluetooth and how it works, and then showed some useful reconnaissance tools that allow you to see what devices are in your area and what services they employ.

After that, Angel and Milo explained some ways bluetooth devices can be hacked.

Our Google Slide Deck:

Security Plus Exam Notes:

If anyone else is studying for the security plus exam, please feel free to reference my notes:

Security Plus Cheat Sheet

bottom of page