Portfolio

CyberSecurity

my Foundations

Below you’ll find materials related to my journey of getting my Google Cybersecurity Professional Certification with little excerpts describing my thoughts and what the project entailed.

Google Cybersecurity Certification

Google Cybersecurity Certification ⌻

Codecademy Certs

Codecademy Certs ⏛

Sololearn Certs

Sololearn Certs ⌺

Vulnerability Assessment ReporT

The Vulnerability Assessment is a companion to the Controls and Compliance Checklist. Instead of inspecting the organizations security posture on the macro level, the goal is to find out what can be done to prevent vulnerabilities on the micro level. In this case, I was tasked with writing a report on seeing what could possibly threaten the integrity of the organizations server and ranking severity, what the outcome would be, and how the organization could prevent these possibilities from occurring.

Tryhackme Journal

The TryHackMe Journal is just a document marking down materials, tips, and general thoughts working through various THM rooms. It’s a nice snapshot to the inner-workings of my mind. Some of the rooms were more of a review for me so there are sections that are devoid of material. Feel free to take a look.

Applying Filters to SQL Queries 

SQL is often used for data examination of logs. I’m fortunate to have had some prior experience with SQL databases in tandem with MS Access back when I was in University. The purpose of this document is to showcase how I could create filters for SQL queries to get relevant records in order to properly examine if there was a possible security incident.

Controls and Compliance checklist

The Controls and Compliance Checklist, works wonders for organizations who are looking to have a todo list when improving their security posture. In this case, Botium Toys is looking for some guidance. The document is easy to understand with a simple checklist for criteria and a brief explanation of the criteria’s. Unfortunately, I don’t know why the checkmarks do not come through on this web embed, I’ll try to figure out if it’s a formatting issue later.

cybersecurity InciDent Report

The TryHackMe Journal is just a document marking down materials, tips, and general thoughts working through various THM rooms. It’s a nice snapshot to the inner-workings of my mind. Some of the rooms were more of a review for me so there are sections that are devoid of material. Feel free to take a look.

Incident Report Analysis

Sometimes, you can’t always stop/catch the bad guys. But, that doesn’t mean you can afford to sit around and be immobile. The Incident Report Analysis is what follows after a legitimate security incident. A DDoS attack managed to take down the organizations server and now its time to pinpoint what went wrong, and how it could be prevented in the future.

Managing File Permissions

In Bash, it’s possible to limit permissions of folders and files based on the status of the User, Group, or Other. This is just a nice little snapshot showcasing my competency at limiting folder and file access, and showing I can navigate a CLI with little difficulty.