The modules 1-8 in this portfolio draw inspiration from Google's best practices.
For more information, please refer to the provided link.
Explore my GitHub portfolio to discover a range of cybersecurity and machine learning projects. I'm passionate about leveraging technology to solve real-world problems.
Description: This comprehensive portfolio showcases a range of cybersecurity projects developed for simulated clients. The projects encompass various aspects of cybersecurity, including frameworks, audits, threat detection, and incident response.
Key Components:
-
NIST Frameworks and Audits: Implementation of the National Institute of Standards and Technology (NIST) cybersecurity frameworks to establish robust security controls and conduct thorough audits.
-
Linux and SQL Proficiency: Utilization of Linux environments and SQL databases to manage and analyze security-related data effectively.
-
Asset, Threat, and Vulnerability Management: Identification and management of assets, assessment of potential threats, and evaluation of vulnerabilities to mitigate risks.
-
Detection and Incident Response: Deployment of tools like Wireshark and tcpdump for network analysis, and implementation of Intrusion Detection Systems (IDS) such as Suricata. Development of incident response strategies, including escalation procedures.
-
Security Information and Event Management (SIEM): Integration with SIEM platforms like Splunk and Chronicle to monitor and analyze security events in real-time.
-
Python Automation: Development of Python scripts to automate repetitive tasks, enhancing efficiency in security operations.
Objective: The primary goal of this portfolio is to demonstrate a holistic understanding of cybersecurity principles and the practical application of various tools and methodologies to protect digital assets.
| Projects | Expertise Highlight |
|---|---|
| Security Controls and Compliance Evaluation | INFOSEC, NIST Risk Management Framework, Security Audits, NIST Cybersecurity Framework, Incident Response Playbooks, CISSP, CIA triad |
| Network Security | TCP/IP model, Network Architecture, Network Communication, Security Hardening, Network Security, Cloud Networks |
| Linux & SQL | Command-line Interface, SQL, Linux, Bash |
| Assets, Threats, & Vulnerabilities | Authentication, Vulnerability assessment, Cryptography, Asset Classification, Threat Modelling Analysis |
| Detection & Response | Incident Lifecycle, Incident Journal |
| Tcpdump & Wireshark | Packet Analyzer |
| IDS & SIEM | Intrusion Detection System (IDS): Suricata, Security Information and Event Management (SIEM): Chronicle, Splunk |
| Automation with Python | Computer Programming, Python Programming, Coding, PEP 8 Style Guide |
- Google Workspace (Drive, Docs, Sheets, Slides)
- Markdown Language
- Tcpdump
- Wireshark
- Linux OS
- SQL
- Chronicle
- Splunk
- Suricata
- Python
This project is licensed under the MIT License - see the LICENSE file for details.