
Hardworking and passionate professional with strong organizational skills, eager to secure entry-level cybersecurity and IT roles within the federal government while also being able to achieve company goals. With my relevant coursework that applies to technology and collaborative efforts, I strongly believe I can enhance national security defenses. I aim to contribute to safeguarding digital infrastructure and information assets. I am devoted to supporting the governments safeguards and mission to protect against cyber threats and vulnerabilities. I am excited to bring new and fresh ideas to uphold the standards and excellence of national security.
Professional Development
Relevant Coursework
- Examines the details of how some of the typical security protection measures work by studying Certificate Authorities (CA), Public Key Infrastructure, Data Encryption Standard, and Security Standards.
- Studies provided you with unique insights into the challenges faced and strategies implemented by our team for businesses countering cyber security threats.
- Provides an introduction to expert system architectures, logical deductions, reasoning with uncertainties (i.e., fuzzy sets, rough sets), knowledge acquisition and representation, and rule-based systems. A language such as PYTHON and an expert system shell such as CLIPS will be used to construct example expert systems using big data concepts.
- DS function based on two principles: anomaly detection and signature detection. There are three main types of IDS: Network Intrusion Detection Systems (NIDS), Host-Based Intrusion Detection Systems (HIDS), and Application Protocol-Based Intrusion Detection Systems (APIDS).
- Introducing a networking concept to learn ideologies. Implementing and applying security concepts to design a LAN and WAN.
- The process of obtaining real-world requirements, analyzing requirements, designing the data and functions of the system, and then implementing the operations in the system.
-Manages information on a company's servers, updates hardware and software, and protects against cyberattacks. Server administration is crucial in maintaining and securing a company's digital services and information.
- The structural design and methodology of a database system, which forms the core of a Database Management System (DBMS). This architecture dictates how data is stored, organized, and retrieved, playing a crucial role in the efficiency and effectiveness of data management.
- A set of discrete elements on which certain operations are defined. Discrete implies noncontinuous and therefore discrete sets include finite and countable sets but not uncountable sets such as the real numbers.
Student Organization or Club Name
Extracurricular Activities