Courses, Projects and Tools

This page highlights my coursework, projects and the tools I used to solve problems and support IT operations. 

Courses and Projects

Welcome to the Projects & Courses section—a showcase of my hands-on cybersecurity training, technical certifications, and real-world simulations. Here you'll find detailed examples of the tools I've mastered, the challenges I've tackled, and the coursework that’s shaped my journey into IT security and network administration.

CST 630 Penetration Testing

  • Conducted comprehensive penetration tests on diverse systems and networks, identifying critical security vulnerabilities and providing actionable remediation strategies in compliance with industry standards.
  • Utilized intrusion detection (IDS) and prevention systems (IPS), vulnerability exploitation, and mitigation techniques including patch management, identity and access management (IAM), encryption and network segmentation.

Implemented strategic thinking along with technical solutions to identify, resolve, prevent, and mitigate cyberattacks, while executing network security techniques

CST 640 Digital Forensics

Developed core competencies in digital forensic investigation, including evidence acquisition, validation, and analysis across various platforms. Utilized industry-standard tools such as Autopsy, FTK Imager, Wireshark, and Volatility to examine disk images, memory dumps, and network traffic. Applied forensic methodologies to support legal and cybersecurity contexts, producing professional-grade reports suitable for criminal and civil proceedings.

Forage

Deloitte Australia Cyber Job Simulation  - July 2025

  • Completed a job simulation involving reading web activity logs
  • Supported a client in a cyber security breach
  • Answered questions to identify suspicious user activity

Mastercard Cybersecurity virtual experience  - October 2024

  • Completed a job simulation where I served as an analyst on Mastercard’s Security Awareness Team 
  • Helped identify and report security threats such as phishing 
  • Analyzed and identified which areas of the business needed more robust security training and implemented training courses and procedures for those teams

Tools and Skills 

Security Operations & Monitoring

SIEM Platforms: Splunk

Endpoint Detection & Response (EDR): CrowdStrike Falcon, SentinelOne

Intrusion Detection/Prevention Systems (IDS/IPS): Cisco, SolarWinds

Threat Intelligence: AlienVault OTX, VirusTotal

 Vulnerability & Penetration Testing

Vulnerability Scanners: Nessus, OpenVAS, 

Penetration Testing Tools: Metasploit, Burp Suite, Nmap, Nikto, SQLmap

Wireless & Web Testing:  Wireshark

Digital Forensics & Incident Response

Forensic Suites: Autopsy, FTK Imager, Volatility, 

Memory & Disk Analysis: Volatility, Windows Storage, Linux Filesystem

Packet & Traffic Analysis: Wireshark, TCPdump

Cloud & Virtualization

Virtualization Platforms: VirtualBox, Hyper-V

Sandboxing & Malware Analysis: Ghidra, Any.Run, Virus Total

System Administration & Automation

Operating Systems: Windows Server, Linux (Ubuntu, Kali), macOS

Scripting & Automation: PowerShell, Bash, Python, C++

Configuration Management: Ansible

Networking & Protocols

Network Tools: Netcat, Traceroute, nslookup, iptables

Protocols: TCP/IP, DNS, DHCP, HTTP/S, FTP, VLANs, VPNs

Core Skills

Threat Detection & Response

Incident Response & Recovery

Vulnerability Assessment & Remediation

Risk Management Framework (RMF)

Security Policy Development & Enforcement

Malware Analysis 

Digital Forensics & Evidence Handling

Identity & Access Management (IAM)

Compliance & Governance (NIST, ISO 27001, HIPAA, PCI-DSS)

Cloud Security & Virtualization

Network Architecture & Segmentation

Technical Documentation & Reporting

Security Awareness & Training

Strategic Planning & Project Coordination