Highly motivated and enthusiastic graduate of the University of Michigan cyber security professional Bootcamp. Possess strong foundational knowledge in network security, threat analysis, and vulnerability management. Proficient in various security tools and technologies, including SIEM, IDS, and firewalls. Demonstrated ability to quickly learn and apply new concepts. Adept at identifying and mitigating security risks, with excellent problem-solving and analytical skills. Solid understanding of safeguarding sensitive data and maintaining data integrity within dynamic and high-pressure environments. I am eager to contribute to a dynamic team and pursue professional growth in the cybersecurity field.
Cybersecurity Labs & Projects, University of Michigan Program, 2023-11-01, 2023-12-01,
Linux Security Bash Scripting through a Debian OS VirtualBox.
Conducted Penetration testing on my clients Company and scanned for live host on the network to gain a better understanding of the network’s activities. Created and accessed a bash script file using nano to create the file pingsweep.sh. Created a for loop that will ping all hosts on the network and print the results to the terminal. Made the loop append the results to the live Hosts file so only relevant information is appended. I used the chmod +x command to make the script executable.
Cybersecurity Labs & Projects, University of Michigan, 2023-09-01, 2023-10-01,
Remote PowerShell Commands between windows server 2016 and windows 10 client Virtual Boxes.
Logged on to the windows 10 client and opened PowerShell as an administrator then used EnablePSRemoting force to enable remote PowerShell commands. Used Ping 10.0.0.1 to verify connectivity to the server. Started the windows remote management service then entered services.msc to find windows remote management. Entered the command Invoke-command -windows 10 client10 -credentials cyber\administrator -script block {hostname}. Used Invoke-command to create a local user on the remote client. Verified that the server is remotely logged in to the client machine using the Hostname command.