
Cybersecurity Specialist with proficiency in online security research, planning, execution and maintenance. Skilled at training internal users on security procedures and preventive measures. Information Security Specialist with passion for aligning security architecture plans and processes with security standards and business goals. Extensive experience developing and testing security framework for cloud-based software. Versed in robust network defense strategies.
CompTIA Security+
I set up two virtual machines; one attacker machine, and one victim machine. The victim machine was a fictional company requesting a penetration test against one of their systems. Using the attacker machine, I performed multiple scans against the victim machine looking for possible exploits. I demonstrated how to gain root access to the victim machine and steal information as well as crack passwords.
My attack demonstration : https://www.youtube.com/watch?v=_Mw23Dxj5uc
I then created a report for the fictional company, demonstrating my ability to break into the system and extract their information. I meticulously broke down each vulnerability I discovered, the dangers of not correcting them, and what actions could be taken to ensure they and their customers would be protected.
My report :
https://docs.google.com/document/d/1gnJuVh0Simx-3ByCv1T13mCp6-2ThLQn9Kj5FQeI2D
Network Security - An in-depth review of systems security, access control, network infrastructure, assessments and audits, cryptography and organizational security across both private and public enterprises. Real-world scenarios reinforce material covered.
Defending the Network - An overview of network defense and countermeasures and the fundamentals of defending networks, such as layered defense. The course introduces students to protective technologies commonly deployed on today's networks, such as system hardening, enterprise firewalls, VPNs, IDS, and antivirus. The course also develops and examines risk analysis and security policies to help build a secure network within Windows and Linux operating systems.
Attacker Tools and Techniques - Focuses on methods attackers use to successfully compromise target networks. Students learn how attackers perform initial reconnaissance and footprinting and then move on to scanning and eventual exploitation. This course approaches security from the hacker's perspective.
Introduction to Digital Forensics - Introduction to the techniques and tools of digital forensics investigations. The course emphasizes digital forensic procedures, digital forensic tools, and legal issues relating to digital forensics.
Penetration Testing and Cyber Red Teaming - An introduction to the concepts and skills necessary to perform penetration testing and red teaming. The goal is to use penetration testing techniques focused on the Penetration Testing Execution Standard (PTES) -including pre-engagement interactions, intelligence gathering, threat modeling, vulnerability analysis, exploitation, post-exploitation, and reporting to perform a penetration test and present findings to management.