Azure:
- Azure: Create a Virtual Machine and Deploy a Web Server
- Securing Azure SQL Database
AWS:
- Create a Virtual Private Cloud (VPC) Using AWS
- Deploy a WordPress Website in AWS EC2
Master’s Degree Course Projects:
- Capture the Flag (CTF): Participated in a CTF exercise, successfully identifying, and exploiting vulnerabilities in a controlled environment to improve hands-on skills in penetration testing.
- Capstone Cybersecurity Project: Developed and executed cybersecurity intelligence strategies; planned and executed defense and exploitation strategies in a controlled environment; designed and implemented a practical cybersecurity solution, measured performance, proposed improvements, and presented findings.
- Network Security Assessment Project: Conducted a thorough network security assessment for a hypothetical enterprise, identifying vulnerabilities and proposing mitigation strategies.
- Forensic Analysis Project: Performed a forensic analysis on a compromised system, documenting the evidence preservation process and presenting the findings in a detailed report.
- Client Server: Developed a client-server multi-processing environment utilizing multi-threading, facilitating simultaneous input and output operations.
- Mini-web server: Created a program to capture HTTP messages exchanged between a web client and server, in addition to developing a web server supporting the same protocol.
- Blockchain: Designed a simple blockchain system to support a ledger shared among network peers. Implemented multicast techniques to transmit unverified blocks and the updated blockchain to all connected devices.
- Access Control: Created a bash script that uses simple ACLs to assign groups and set permissions to secure documents at a law firm.
- Encrypted Messaging: Created an encrypted messaging system demonstrating the practical application of both symmetric and asymmetric cryptographic techniques.
- Implementation of Network Defense-in-depth Mechanism: Designed and implemented a network featuring firewall configurations, VPNs, and Intrusion Detections Systems, embodying the concepts of “Defense-in-Depth.”
- Advanced Network Security Infrastructure Design: Proposed a complex enterprise security infrastructure design integrating advanced firewall considerations, intrusion detection, and incident response mechanism.
- Risk and Compliance Audit Simulation: Carried out a simulated risk and compliance audit, highlighting the application of legal standards and industry compliance to hypothetical business.
- IT Audit and Governance Frameworks Analysis: Analyzed various IT governance and assurance frameworks, such as COBIT, and conducted a mock audit of IT process and controls.