Paul Harrison Logo Image
Paul Harrison

Google Cybersecurity Professional Certificate

Certificate overview screenshot

Comprehensive Notes & Modules

Detailed notes, write-ups, and reflections for each module of the Google Cybersecurity Professional Certificate: risk management, network security, system hardening, SIEM & log analysis, incident response, and digital forensics.

View All Notes on GitHub

Labs & Mini-Projects

Internal Audit – Botium Toys

Completed a simulated internal audit using the NIST Cybersecurity Framework. Evaluated risks, reviewed control categories, assessed GDPR/PCI compliance posture, and wrote detailed recommendations for improving security.

View Audit Report

OS Hardening Incident Analysis

Incident analysis response report to simulated brute-force attack, completed as extension of Operating Systems hardening module.

View Analysis

Incident Report – SYN Flood

Investigation and report on simulated SYN Flood attack patterns, as well as traffic and packet analysis findings and future mitigation techniques.

View Report

DNS & ICMP Analysis

Investigated a DNS failure using tcpdump and ICMP/UDP analysis. Found that the DNS server was rejecting queries with “port unreachable” errors, meaning likely downtime or firewall misconfiguration. Focused on clearly documenting findings.

View Analysis

Brief Network Hardening Analysis

Found & recommended remedies for a security breach which occurred within a virtual social media organization; performed security risk assessment.

View Analysis

ICMP Flood - DDoS Attack - NIST CSF Incident Report

Analyzed a simulated DDoS attack targeting a company's internal network via an ICMP flood. Incident caused a complete network outage, traced to a misconfigured firewall. Documented using the NIST Cybersecurity Framework.

View Report

File Directory Authorization Management

Demonstrated Linux file-permission management: examined current permissions, interpreted the 10-character permission strings, and used chmod and ls -la to secure files and directories as part of a cybersecurity portfolio activity.

View Activity

Vulnerability Assessment Report – E-commerce Scenario

Conducted a vulnerability assessment of a simulated publicly accessible e-commerce database server using NIST SP 800-30 guidelines, calculated risk scores, identified threat sources/events, and proposed remediation strategies to secure the system.

View Assessment Report