
Basic Wi-Fi Pentesting for WPA2
Understanding how to protect networks involves knowing how a malicious user might gain access to them. As I’ve been diving deeper into computer networking, this has been a fascinating aspect to exp...
Understanding how to protect networks involves knowing how a malicious user might gain access to them. As I’ve been diving deeper into computer networking, this has been a fascinating aspect to exp...
Returning to the Challenge My process in expanding my skill set to the cloud and specifically Azure has been a long and rewarding experience. Learning new skills and concepts, gaining hands-on expe...
VPN Mismatch To be honest, much of what we hear about VPNs in the cybersecurity market isn’t entirely accurate. Most of the connections we make to websites are already secure, as HTTPS provides enc...
Where security meets transparency. In the realm of digital security, the concept of integrity holds significant weight. Ensuring the integrity of shared files is paramount to maintaining trust and ...
Objectives I made this lab during the summer of 2023 in my time preparing for more advanced roles beyond my current IT Support role at the time. It taught me a lot about the basics of Windows netwo...
Let’s Take A Step Back The last couple of posts were post-graduation work I completed. However, this project was completed during the first half of the semester for COMP 490 - Senior Design and Dev...
Objective The Cloud Resume Challenge is a multiple-step resume project which helps build and demonstrate skills fundamental to pursuing a career as a Cloud Engineer. The project was first published...
Azure Honeynet and SOC Project: Cyber Attacks in Real Time Introduction In this project, I simulate a small-scale honeynet that attracts real-world traffic from attackers around the world through M...
Welcome to My Portfolio Site! The purpose of this website is to document my learning progress in the world of Computer Science. It serves to better track my journey in various domains such as secu...