Skills

This page presents my acquired marketable skills and their supporting artifacts.

Analytical Reasoning

Strong analytical and problem-solving skills are essential in the cybersecurity field. The ability to critically analyze complex scenarios is important for a cybersecurity professional to make an informed decision about protecting systems from cyber threats. The capacity to adapt, think critically, recognize patterns, and make data-driven decisions directly influences a professional’s ability to detect threats and effectively assess risks.

This Interdisciplinary Term Paper consists of a multiple disciplinary explanation to a complex problem.

This Final Exam demanded an in-depth understanding of risk assessment and mitigation aspects.

These Network System Security quizzes facilitate problem-solving and decision-making for different network security topics.

Communication

Excellent communication and teamwork abilities are important in cybersecurity. Effective collaboration and the ability to voice concerns with other professionals, departments, and overseeing officers will help mitigate potential risks, ensure compliance, and effectively respond to incidents.

This Gallery brings you through a handful of construction projects I have completed.

This Memorandum Exercise evaluates a scenario and answers the questions proposed by a CEO with professional quality, clarity, and thoroughness of analysis.

This Group Project demonstrates my understanding of the applied aspects of Python and Cybersecurity/Networking while I conducted the learning objective with three fellow students.

Technical

Technical skills are essential for cybersecurity success. They allow cyber professionals to perform their duties and tackle demands required for the safeguarding of complex systems. Employers look for candidates’ technical abilities to determine who can solve problems, improve productivity, and adapt to the ever-changing technical field.

This Lab creates advanced network configurations as a network administrator. I set up my Virtual Machine as a gateway to provide internet access to another client’s Virtual Machine.

This Lab I learned how to test a web application for SQL injection. I also, learned how to execute error-based and UNION-based SQL injection using Burp Suite.

This Lab I exploited vulnerable servers using specific payload configurations on metasploitable and kali attacker.