Solid Technical Foundation
- Cybersecurity
- The first embedded file is a penetration testing lab that showcases my ability to understand Linux and Windows operating systems in order to implement a backdoor system. Providing persistent access, therefore allowing me to identify weak points in firewalls.
- The second embedded file is a detailed analysis of BIA, BCP, DRP, and CIRTs and why they are important to a risk management plan. This showcases my understanding of the precautions and proactive measures to minimize risk and loss and how they are applied in a risk management plan.
- The third embedded file in this group is an ethical hacking lab that showcases my ability to understand Malware and its particular interactions with in a system. This lab specifically focuses on malware with the signature Mirai and VIPKeylogger. I also put them through a public analysis on any run to determine their methods of infiltration and malice.
- Research & Reporting
- The first embedded file is a social analytical report that covers cyberterrorism, its effects, where it comes from and why it happens. This showcases my ability to analyze past cyber attacks and identify a motive for these actions.
- The second embedded file is a short security policy that identifies the fives most important security issues, and utilizes information researched from reputable frameworks. This proves my ability to research information and apply that to policies and plans I develop.
- The final embedded file in this group is a research report on the Equifax data breach of 2017. This report explores how the breach happened, its direct effects on people, its indirect effects, and potential ways it could have been prevented. This highlights my use of research to hypothesize different preventative and proactive measures that can be taken to prevent breaches such as this. Additionally it proves my knowledge of how leaks like this have lasting impact on people.
- Programming
- The first embedded file is a C# lab that showcases my understanding of the C# programming language, and how to develop useful programs. The key points of this particular program is that it utilizes random number generation and a stopwatch system to time the user in a series of math questions.
- The second embedded file is a Java program that uses a multitude of methods in order to calculate numerous variables in the main method. This provides insight to my knowledge of the Java programming language, and my ability to create organized and easy to interpret code to accomplish multiple tasks.
- The final two embedded files are Python programs create a server-client connection that allow for a secure voting process. Additionally it requires authentication and stores login information with encryption. It also allows for multiple connections to be carried out at once. This provides an efficient information collecting service that is secure and anonymous. This proves my skills in using the Python programming language to develop programs that interact with multiple other systems, and vice versa.