Projects

Azure:

  • Azure: Create a Virtual Machine and Deploy a Web Server
  • Securing Azure SQL Database

AWS:

  • Create a Virtual Private Cloud (VPC) Using AWS
  • Deploy a WordPress Website in AWS EC2

Master’s Degree Course Projects:

  • Capture the Flag (CTF): Participated in a CTF exercise, successfully identifying, and exploiting vulnerabilities in a controlled environment to improve hands-on skills in penetration testing.
  • Capstone Cybersecurity Project: Developed and executed cybersecurity intelligence strategies; planned and executed defense and exploitation strategies in a controlled environment; designed and implemented a practical cybersecurity solution, measured performance, proposed improvements, and presented findings.
  • Network Security Assessment Project: Conducted a thorough network security assessment for a hypothetical enterprise, identifying vulnerabilities and proposing mitigation strategies.
  • Forensic Analysis Project: Performed a forensic analysis on a compromised system, documenting the evidence preservation process and presenting the findings in a detailed report.
  • Client Server: Developed a client-server multi-processing environment utilizing multi-threading, facilitating simultaneous input and output operations.
  • Mini-web server: Created a program to capture HTTP messages exchanged between a web client and server, in addition to developing a web server supporting the same protocol.
  • Blockchain: Designed a simple blockchain system to support a ledger shared among network peers. Implemented multicast techniques to transmit unverified blocks and the updated blockchain to all connected devices.
  • Access Control: Created a bash script that uses simple ACLs to assign groups and set permissions to secure documents at a law firm.
  • Encrypted Messaging: Created an encrypted messaging system demonstrating the practical application of both symmetric and asymmetric cryptographic techniques.
  • Implementation of Network Defense-in-depth Mechanism: Designed and implemented a network featuring firewall configurations, VPNs, and Intrusion Detections Systems, embodying the concepts of “Defense-in-Depth.”
  • Advanced Network Security Infrastructure Design: Proposed a complex enterprise security infrastructure design integrating advanced firewall considerations, intrusion detection, and incident response mechanism.
  • Risk and Compliance Audit Simulation: Carried out a simulated risk and compliance audit, highlighting the application of legal standards and industry compliance to hypothetical business.
  • IT Audit and Governance Frameworks Analysis: Analyzed various IT governance and assurance frameworks, such as COBIT, and conducted a mock audit of IT process and controls.