Technical Skills
I possess strong technical skills in cybersecurity, including performing penetration testing and password cracking to assess system defenses. I am proficient in writing shell scripts to automate security tasks and streamline vulnerability assessments. Additionally, I utilize tools such as Nessus and Zenmap to identify and analyze critical vulnerabilities within networks.
Using Nmap and Nessus to scan the host 192.168.10.14 demonstrates my ability to identify network vulnerabilities and assess security risks. This hands-on experience strengthens my competencies in network security by applying industry-standard tools for vulnerability discovery.


CYSE 301 CYBERSECURITY TECHNIQUES AND OPERATIONS
The commands shown are used in a Linux environment to create new user groups and assign users to those groups, which is an essential part of managing permissions and access control. Proper group and user management helps ensure that only authorized individuals have access to specific resources, enhancing overall system security.


CS 270 demonstrates how I implement Shell Scripting using a while loop, and I use the John the Ripper tool to crack their passwords in wordlist mode.
A shell script can automate tasks in the Linux environment, such as processing files or managing system operations, using loops and conditional statements. John the Ripper is a password-cracking tool that tests password strength by systematically trying words from a list against encrypted passwords.