Courses

Coursera:

Microsoft Cybersecurity Analyst

Udemy Courses:

Splunk Course:

  • Intro to Splunk
  • Intro to Knowledge Objects
  • Creating Knowledge Objects
  • Using Fields
  • Comparing Values
  • Result Modification
  • Statistical Processing
  • Working with Time

Master’s Degree:

  • Discrete Structures for Computer Science: Explored fundamental mathematical concepts necessary for computer science, including logic, discrete structures, graphs, and statistics.
  • Introduction to Programming: Covered fundamentals of programming with an emphasis on problem-solving and algorithm development.
  • Data Structures I: Discussed basics of data structures such as arrays, linked lists, stacks, queues, and binary trees.
  • Data Structures II: Advanced course focusing on complex data structures like graphs, hash tables, and heaps.
  • System I: Introduced operating system concepts including process management, memory management, and file systems.
  • System II: In-depth exploration of system concepts with emphasis on system-level programing and process synchronization.
  • Distributed Systems: Focus on understanding the principles, design, and applications of distributed systems.
  • Object-Oriented Software Development: Discussed principles and practices of object-oriented programing and design, including use of UML and design patterns.
  • Network Security I: Examined network infrastructure security issues, defenses, and strategies for deployment of “Defense-in-Depth.”
  • Network Security II: An advanced course in network security covering intrusion detection security, engineering processes, and incident response.
  • Information Security Management: Explored managing information assets and the security infrastructure, risk analysis, and compliance.
  • Computer Security: Covered core principles of computer security including user authentication, access control, and security auditing.
  • Governance Policies in Information Assurance: Focused on business risk arising from information security and privacy issues and policy creation for legal compliance.
  • IT Auditing: Covered principles related to auditing information technology processes and related controls.
  • Digital Forensic Techniques: Focused on forensic acquisition, analysis, and presentation of data from computer systems, covering evidence preservation, forensic imaging, data recovery, Windows registry forensics, internet history, social media analysis, mobile device forensics, timeline analysis, incident response, and expert report writing.
  • Computer Information and Network Security Capstone: Developed and executed cybersecurity intelligence strategies; planned and executed defense and exploitation strategies; designed and implemented a practical cybersecurity solution, measured performance, proposed improvements, and presented findings.
  • Security Testing and Assessment: Covered methodologies and tools for vulnerability testing, managing security testing initiatives, various types of assessments, legal and ethical concerns, and defensive mechanisms using Defense-In-Depth architectures. Included hands-on lab exercises to illustrate concepts.