My Cybersecurity Projects
Scope Goals and Risk Assessment Report.
Analysis of Network Hardening
Analysis Network Attack
Analysis Network Layer Communication
Request For Resume
Apply OS Hardening Techniques.
Classify the assets connected to a home network.
Create hash values.
Determine appropriate data handling practices.
Identify the attack vectors of a USB drive.
Update a file through a Python algorithm.
Unmask phishing and malware with AI.
Use the NIST Framework to respond to a Security Incident.
Apply Filters to SQL Query.
Use Linux Command to manage file permission.
Analyze a Vulnerable system for a small business.
Apply the PASTA threat model framework.
Improve (AAA) Authentication, Authorization, and Accounting for a small business.
Score risks based on their likelihood and severity.
Use of Angry IP scanner.
Document an incident with an incident handler journal.
Investigate a suspicious file hash.
Perform a query with the Chronicle
Perform a query with Splunk.
Research network protocol analyzers.
Review a final report.
Use a playbook to respond to a phishing incident.
Finalize incident handler's journal.
Identify local network configuration.
Cybersecurity Expertise
We are offering professional cybersecurity services to protect your digital assets and ensure online safety.
Cybersecurity
1+ Year Experience In Cybersecurity to protect online assets and apply compliances
Web Design
Creating stunning WordPress websites tailored to your needs, ensuring functionality and aesthetic appeal.