CMSC 135 - Introduction to Scripting
- Applied Python scripting language to create simple programs
- Explored how Python can be employed in different tasks
- Demonstrated a practical understanding of Python through hands-on exercises
Results-driven, dependable, and highly motivated college student with a keen interest for cybersecurity and a strong commitment to pursuing excellence and experience in the field. Currently pursuing an associates degree in cybersecurity; I possess security concepts, protocols, and technologies gained through coursework and hands-on labs. I am seeking opportunities to apply and further develop my skills through internships or entry-level positions in cybersecurity. I would love to be given an opportunity to be molded and to grow with a dynamic and welcoming organization.
- Applied Python scripting language to create simple programs
- Explored how Python can be employed in different tasks
- Demonstrated a practical understanding of Python through hands-on exercises
- Performed labs through Testout Lab-Sim which required troubleshooting, repairing, and maintaining microcomputer device components
- Explored different operating systems and conducted analysis of each, emphasizing features and functionalities
- Gained insight into the importance of security measures in the context of microcomputer devices
- Gained insight into common network devices while also diving into the OSI model and common protocols to establish a foundational understanding
- Applied concepts learned through hands-on Cisco Packet Tracer Simulations
- Learned security concepts that emphasized the principles of Confidentiality, Integrity, and Availability
- Applied concepts in hands-on labs using Testout Lab-Sim, simulating real-world scenarios to enhance understanding
- Implemented solutions and conducted hands-on labs to ensure security measures in simulated devices
- Explored security ramifications, including technology weaknesses, policy weakness, and human errors
- Learned various components of networks, including clients and servers, routers, firewalls, IDSs, VPNs, and antivirus software
- Explored how each component is configured to contribute to the overall defense and security of a network
- Explored techniques to harden devices in a network, ensuring defense against potential threats
- Discussed ACLs as a method to secure routers, controlling traffic, and preventing unauthorized access
- Simulated forensic procedures through hands on exercises to ensure the integrity of digital evidence for investigative purposes
- Worked on recovering graphic files to retrieve and reconstruct digital images
- Used Windows to make use of current computer forensics tools and to obtain forensics information in order to perform forensics analysis and validation
- Able to maintain composure and remain patient, especially in challenging situations
- Able to effectively communicate with leaders and team members in a group setting
- Able to adapt adequately to unexpected situations and to different personalities
- Always and continuously seeking feedback to identify areas for improvement, while also being very coachable