top of page

Technical Skills
 

In today's swiftly evolving digital world, my professional journey is rooted in a solid foundation of technical skills, which encompass the ability and knowledge necessary to perform specific tasks, including programming languages and digital tools. These skills have been acquired through a combination of academic learning and hands-on experiences during my college years. I understand the importance of swiftly acquiring new technical skills, given the rapid evolution of industries and the constant emergence of innovative tools and techniques. This adaptability and commitment to continuous learning drive my desire to be a proactive catalyst for positive change in the dynamic digital landscape.

tech skill.png

1

CYSE 407 Digital Forensics

2

CYSE 301 Cyber Operations          and Techniques           

3

MSIM 470 Cyber Foundations

Digital Forensics

Lab Project

In this project, I embarked on a journey where the field of computer science and legal knowledge converged. This project was my portal into the heart of digital forensics, covering techniques and tools for collecting and analyzing digital evidence in various environments.

My mission was to construct a comprehensive report that would serve as the blueprint for a state-of-the-art computer forensics laboratory. This involved the meticulous planning of the laboratory's physical layout, secure evidence storage, high-powered analysis computers, and reinforced security measures.

Cyber Operations and Techniques

Password Cracking

This course provided a great sandbox to learn and test out tools that are relevant to cybersecurity. In this project, I learned how to crack passwords through John The Ripper, Cain & Able, and Hashcat.  It was a hands-on, exciting journey that brought the theoretical knowledge to life and left a lasting impression on my understanding of Linux commands and the importance of strong passwords.

Cyber
Foundations

Buffer Overflow

This lab focuses on hands-on experience with buffer-overflow vulnerabilities—situations where a program writes data beyond fixed-length buffers. Exploiting this vulnerability allows manipulation of program flow and execution of arbitrary code. The task involves working with a vulnerable program to gain root privilege and evaluating implemented protection schemes. This practical exercise deepens understanding of security vulnerabilities and countermeasures in the operating system.

bottom of page