Overview
            Cybersecurity requires a strong technical foundation in tools, methodologies, and security assessment techniques. Through hands-on labs, vulnerability analysis, and penetration-testing simulations, I have developed the technical competencies necessary for both defensive and offensive cybersecurity roles. These artifacts demonstrate my ability to confidently navigate industry-standard platforms, conduct threat assessments, and validate vulnerabilities in controlled environments.


Supporting Artifact 1: Nmap Network Enumeration Lab

Description:
            This lab demonstrates my ability to perform network reconnaissance using Nmap to identify open ports, active services, OS fingerprints, and potential attack vectors. Network enumeration is a foundational skill in both penetration testing and network defense, and this artifact highlights my proficiency in assessing internal network exposure and analyzing scan results for security insights.


Supporting Artifact 2: Metasploit Exploit Demonstration

Description:
            In this controlled lab environment, I executed a Metasploit exploit against a known Windows vulnerability. This artifact shows my understanding of exploitation workflows, payload selection, and post-exploitation considerations. Completing this assignment strengthened my ability to validate vulnerabilities safely and reinforced responsible use of offensive security tools.


Supporting Artifact 3: Nessus Vulnerability Scan Report

Description:
            This report highlights my experience using Nessus, a widely adopted enterprise vulnerability scanner. I performed a full vulnerability assessment, analyzed critical findings, and recommended remediation steps. This artifact demonstrates my ability to interpret scan data, prioritize risks, and communicate actionable security recommendations.