Courses, Projects and Tools
This page highlights my coursework, projects and the tools I used to solve problems and support IT operations.
Courses and Projects
Welcome to the Projects & Courses section—a showcase of my hands-on cybersecurity training, technical certifications, and real-world simulations. Here you'll find detailed examples of the tools I've mastered, the challenges I've tackled, and the coursework that’s shaped my journey into IT security and network administration.
CST 630 Penetration Testing
- Conducted comprehensive penetration tests on diverse systems and networks, identifying critical security vulnerabilities and providing actionable remediation strategies in compliance with industry standards.
- Utilized intrusion detection (IDS) and prevention systems (IPS), vulnerability exploitation, and mitigation techniques including patch management, identity and access management (IAM), encryption and network segmentation.
Implemented strategic thinking along with technical solutions to identify, resolve, prevent, and mitigate cyberattacks, while executing network security techniques
CST 640 Digital Forensics
Developed core competencies in digital forensic investigation, including evidence acquisition, validation, and analysis across various platforms. Utilized industry-standard tools such as Autopsy, FTK Imager, Wireshark, and Volatility to examine disk images, memory dumps, and network traffic. Applied forensic methodologies to support legal and cybersecurity contexts, producing professional-grade reports suitable for criminal and civil proceedings.
Forage
Deloitte Australia Cyber Job Simulation - July 2025
- Completed a job simulation involving reading web activity logs
- Supported a client in a cyber security breach
- Answered questions to identify suspicious user activity
Mastercard Cybersecurity virtual experience - October 2024
- Completed a job simulation where I served as an analyst on Mastercard’s Security Awareness Team
- Helped identify and report security threats such as phishing
- Analyzed and identified which areas of the business needed more robust security training and implemented training courses and procedures for those teams
Tools and Skills
Security Operations & Monitoring
SIEM Platforms: Splunk
Endpoint Detection & Response (EDR): CrowdStrike Falcon, SentinelOne
Intrusion Detection/Prevention Systems (IDS/IPS): Cisco, SolarWinds
Threat Intelligence: AlienVault OTX, VirusTotal
Vulnerability & Penetration Testing
Vulnerability Scanners: Nessus, OpenVAS,
Penetration Testing Tools: Metasploit, Burp Suite, Nmap, Nikto, SQLmap
Wireless & Web Testing: Wireshark
Digital Forensics & Incident Response
Forensic Suites: Autopsy, FTK Imager, Volatility,
Memory & Disk Analysis: Volatility, Windows Storage, Linux Filesystem
Packet & Traffic Analysis: Wireshark, TCPdump
Cloud & Virtualization
Virtualization Platforms: VirtualBox, Hyper-V
Sandboxing & Malware Analysis: Ghidra, Any.Run, Virus Total
System Administration & Automation
Operating Systems: Windows Server, Linux (Ubuntu, Kali), macOS
Scripting & Automation: PowerShell, Bash, Python, C++
Configuration Management: Ansible
Networking & Protocols
Network Tools: Netcat, Traceroute, nslookup, iptables
Protocols: TCP/IP, DNS, DHCP, HTTP/S, FTP, VLANs, VPNs
Core Skills
Threat Detection & Response
Incident Response & Recovery
Vulnerability Assessment & Remediation
Risk Management Framework (RMF)
Security Policy Development & Enforcement
Malware Analysis
Digital Forensics & Evidence Handling
Identity & Access Management (IAM)
Compliance & Governance (NIST, ISO 27001, HIPAA, PCI-DSS)
Cloud Security & Virtualization
Network Architecture & Segmentation
Technical Documentation & Reporting
Security Awareness & Training
Strategic Planning & Project Coordination
Create Your Own Website With Webador