Skip to content

IST 894 Portfolio

This website is my (Jason Tolbert) portfolio for IST 894-001 (Spring 2025) at the Pennsylvania State University.

Cybersecurity Jobs and Skills

The table below maps common cybersecurity job roles to the core skill categories emphasized throughout the course's lab activities. Each checkmark indicates that the associated job typically requires competency in that skill category.

Cybersecurity Job Role Technical Exploitation Network & Traffic Analysis Incident Response & Forensics Security Engineering Policy & Compliance Leadership & Strategy
Penetration Tester
Incident Responder
GRC Analyst
Forensics Investigator
Security Analyst
Security Engineer
CISO

Portfolio Reflection

An overview of the different cybersecurity topics I engaged with in IST 894 and some final thoughts on my experience in the course.

Read my reflection

Lab 12 Report

The Lab 12 Report provides an overview of the InfoSec Institute's CySA+ Software Assurance and CySA+ Log, SIEM, and Email Analysis cyber range-based labs.

Read the report

Lab 11 Report

The Lab 11 Report provides an overview of the InfoSec Institute's Cybersecurity Senior Management and Information Security Governance (ISG) video-based lab.

Read the report

Lab 10 Report

The Lab 10 Report provides an overview of the InfoSec Institute's Digital Forensics Techniques and Indicators of Compromise cyber range-based labs.

Read the report

Lab 9 Report

The Lab 9 Report provides an overview of the InfoSec Institute's Digital Evidence and Legal Issues video-based lab.

Read the report

Lab 8 Report

The Lab 8 Report provides an overview of the InfoSec Institute's Cryptography and AAA cyber range-based labs.

Read the report

Lab 7 Report

The Lab 7 Report provides an overview of the InfoSec Institute's Web Vulnerabilities, Secure and Insecure Protocols, and Network Security and Diagnostics cyber range-based labs.

Read the report

Lab 6 Report

The Lab 6 Report provides an overview of the InfoSec Institute's Insecure Direct Object Reference (IDOR) & Directory Traversal cyber range-based lab.

Read the report

Lab 5 Report

The Lab 5 Report provides an overview of the InfoSec Institute's Reconnaissance and Resource Development, Pivoting with Proxychains, and Defense Evasion cyber range-based labs.

Read the report