The modules 1-8 in this portfolio draw inspiration from Google's best practices.
For more information, please refer to the provided link.
Explore my GitHub portfolio to discover a range of cybersecurity and machine learning projects. I'm passionate about leveraging technology to solve real-world problems.
Description: This comprehensive portfolio showcases a range of cybersecurity projects developed for simulated clients. The projects encompass various aspects of cybersecurity, including frameworks, audits, threat detection, and incident response.
Key Components:
-
NIST Frameworks and Audits: Implementation of the National Institute of Standards and Technology (NIST) cybersecurity frameworks to establish robust security controls and conduct thorough audits.
-
Linux and SQL Proficiency: Utilization of Linux environments and SQL databases to manage and analyze security-related data effectively.
-
Asset, Threat, and Vulnerability Management: Identification and management of assets, assessment of potential threats, and evaluation of vulnerabilities to mitigate risks.
-
Detection and Incident Response: Deployment of tools like Wireshark and tcpdump for network analysis, and implementation of Intrusion Detection Systems (IDS) such as Suricata. Development of incident response strategies, including escalation procedures.
-
Security Information and Event Management (SIEM): Integration with SIEM platforms like Splunk and Chronicle to monitor and analyze security events in real-time.
-
Python Automation: Development of Python scripts to automate repetitive tasks, enhancing efficiency in security operations.
Objective: The primary goal of this portfolio is to demonstrate a holistic understanding of cybersecurity principles and the practical application of various tools and methodologies to protect digital assets.
Projects | Expertise Highlight |
---|---|
Security Controls and Compliance Evaluation | INFOSEC , NIST Risk Management Framework , Security Audits , NIST Cybersecurity Framework , Incident Response Playbooks , CISSP , CIA triad |
Network Security | TCP/IP model, Network Architecture , Network Communication , Security Hardening , Network Security , Cloud Networks |
Linux & SQL | Command-line Interface , SQL , Linux, Bash |
Assets, Threats, & Vulnerabilities | Authentication , Vulnerability assessment , Cryptography , Asset Classification , Threat Modelling Analysis |
Detection & Response | Incident Lifecycle , Incident Journal |
Tcpdump & Wireshark | Packet Analyzer |
IDS & SIEM | Intrusion Detection System (IDS): Suricata , Security Information and Event Management (SIEM): Chronicle , Splunk |
Automation with Python | Computer Programming , Python Programming , Coding , PEP 8 Style Guide |
- Google Workspace (Drive, Docs, Sheets, Slides)
- Markdown Language
- Tcpdump
- Wireshark
- Linux OS
- SQL
- Chronicle
- Splunk
- Suricata
- Python
This project is licensed under the MIT License - see the LICENSE file for details.