My name is Nathaly; it comes of Latin origin, meaning “birthday.” Honestly, this is the first time finding my name on google; other times, when I researched, there was nothing close to it but Natalie, which is the same name but in English, which means “birth of the Lord.”
The first thing to learn about me is that I ‘am a single mother of two beautiful children, ages 6 and 9. They radiate so much happiness in my life, even when tough times. I speak Spanish and English fluently. I try to teach my children in Spanish a bit about my culture; I was born in Venezuela but never lived there, but I visited a few times. Number one, they are my motivation to keep on going and to teach them right and wrong and that everything is possible by God’s grace, and number two, you have to believe in yourself that you can make your goals happen few things that I try to encourage my children to believe in themselves.
Interesting facts about me, I love playing my guitar, I do not consider myself an expert on it, but I enjoy playing it whenever I have a chance. I consider excellent qualities are: integrity, honesty, good listening, and hard work. As you can see, I love spending time with my family. I had the privilege of working at the airport years ago, which allowed me to meet cool places domestically. It gave me a chance to visit Venezuela and Aruba.
I learned that you should not let others steal your joy but remain hopeful even when situations do not look how you want them to be.
Month: August 2022
Technical Skills
Technical skills mean having the specialized wisdom and expertise to perform specific tasks and use specific tools and programs in real-world problems. Since taking the advanced Ethical hacking course, I have learned Metasploit, Burp Suite, Nata’s, Cross Site, Web App, SQL, etc. Advanced Ethical Hacking class was my most enjoyable and technical course as well as Advanced Cybersecurity Techniques and Operations taught me how I can perform penetration testing on a network and understand protocols and tools used in different systems and exploiting their weaknesses.
Advanced Cybersecurity Techniques and Operations CYSE 601
The assignment below was one of the simple assignments I had to do, which was Conducting rapid reconnaissance of a compromised system and then producing a real game plan about the Equifax breach.
Advanced Ethical Hacking and Penetration Testing CYSE 625
The assignment below is about Metasploit and Nmap and finding open ports, and how to find services running on those ports.
Advanced Ethical Hacking and Penetration Testing CYSE 625
In this assignment, we did Metasploit attacks using windows seven exploits and reverse access Trojan created in the MSFvenom.
Advanced Ethical Hacking and Penetration Testing CYSE 625
In this assignment, we use Sublime Text editor with Python and test web applications.
CYSE 301 Cybersecurity Techniques and Operations
The Assignment Below is about Windows Pentesting attacking our windows account through Metasploit and setting up meterpreter reverse shell connections to target Windows 7.
Critical Thinking
Critical thinking means analyzing facts, evidence, observing, and arguments to form a judgment—cybersecurity specializes in unique, complex problems integrating various disciplines. My artifact below shows the skill I learned in my Cyberlaw class, Digital Forensics class, Leadership Management in Cybersecurity class, and Advanced Cyber Policy.
Advanced Cyber Policy CYSE 603
In the assignment below, I wrote about cloud computing white paper policies and made a PowerPoint presentation about my essay.
Leadership Management in Cybersecurity CYSE 605
In the assignment below, I wrote about the Security Awareness Program, the Chief Information Security Office (CISO), the duties of a CISO, and how they implement security awareness in a company.
Digital Forensics CYSE 407
In the assignment below, I had to make a Forensics Evidence Report with the evidence provided and give our analysis of what happened and summary.
Cyber Law CYSE 406
In the assignment below, I wrote about Carpenter vs. the United States. The supreme court reversed the decision of the lower court that the seizure and search of 127 days’ worth of an individual’s cell phone location and data was not a “search” under the Fourth Amendment.
Writing Skills
Writing skills are distinctive abilities that help writers put their thoughts into words in a meaningful form. The three artifacts in this area show my ability to analyze data and create a logical view of my position while addressing other viewpoints. The following writing is from my Master’s Class, Cybersecurity Principles, CYSE 600, and Mobile and Wireless, known as CYSE615.
Mobile and Wireless Security CYSE 615
The assignment above is a bi-weekly essay about providing security for medical data, and the pros and cons of having our personal medical information on our device affects its security.
Cybersecurity Principles CYSE 600
The assignment below is the Long Analytical paper I wrote about. My Analytical research paper is about Social Media and Cybercrimes Awareness, including extensive references and research.
Cybersecurity Principles CYSE 600
I wrote a short analytical paper about The Cybersecurity Framework Outline in the assignment below.
Cybersecurity Principles CYSE 600
I wrote a short analytical paper about Phishing in the assignment below.
Cybersecurity, Technology, and Society CYSE 200T
I wrote a short analytical paper about Cyber Attacks in the assignment below.