My Cybersecurity Projects
Scope Goals and Risk Assessment Report.
Analysis of Network Hardening
Analysis Network Attack
Analysis Network Layer Communication
Resume
Apply OS Hardening Techniques.
Classify the assets connected to a home network.
Create hash values.
Determine appropriate data handling practices.
Identify the attack vectors of a USB drive.
Update a file through a Python algorithm.
Unmask phishing and malware with AI.
Use the NIST Framework to respond to a Security Incident.
Apply Filters to SQL Query.
Use Linux Command to manage file permission.
Analyze a Vulnerable system for a small business.
Apply the PASTA threat model framework.
Improve (AAA) Authentication, Authorization, and Accounting for a small business.
Score risks based on their likelihood and severity.
Use of Angry IP scanner.
Document an incident with an incident handler journal.
Investigate a suspicious file hash.
Perform a query with the Chronicle
Perform a query with Splunk.
Research network protocol analyzers.
Review a final report.
Use a playbook to respond to a phishing incident.
Finalize incident handler's journal.
Identify local network configuration.
Cybersecurity Expertise
We are offering professional cybersecurity services to protect your digital assets and ensure online safety.
Cybersecurity
1+ Year Experience In Cybersecurity to protect online assets and apply compliances
Web Design
Creating stunning WordPress websites tailored to your needs, ensuring functionality and aesthetic appeal.