A bit about me
My journey in technology began in a weekend market where I humbly started by mopping floors and packing store rooms until I learned how to mod and repair various types of gaming consoles & computers. This was the leadup to my career in cloud solutions & cybersecurity. I'm Technology enthusiast with 12+ years of experience working in MSP & enterprise environments. I enjoy actively learning about new technologies as well as how to attack and defend them. I actively seek out challenges and opportunities to develop new skills in the security field. My current ventures have given me some exposure to physical security with lock picking as well as various "auditing tools" that I built using Raspberry PI & PI Pico devices.
Skill | Associated Project/Training |
---|---|
Ethics in cybersecurity, historical attacks and how attacks impact businesses | Foundations of Cybersecurity |
Linux & SQL using CLI to query SQL databases | Tools of the Trade: Linux and SQL |
Network security hardening, architecture & cloud networks | Connect and Protect: Networks and Network Security |
Network traffic analysis , IDS, SIEM queries and investigation | Sound the Alarm: Detection and Response |
Asset classification , Risk analysis , threat modelling & vulnerability assessments | Assets, Threats, and Vulnerabilities |
Using playbooks to respond to threats, security auditing , risk management | Play It Safe: Manage Security Risks |
Network reconnaissance | NMAP |
DNS enumeration | Subdomain Enumeration |
Username enumeration, brute force attacks & cookie tampering | Fuzz |
Walking web applications | Web app source inspection ,debug and network inspection using developer tools |
Manipulating URLs and inspecting sites to access restricted accounts and content | IDOR vulnerability exploit |
Digital forensics ,Exif viewer ,metadata analysis and gathering GPS co-ordinates from image metadata | Subdomain Enumeration |
Creating & deploying trojans, worms & using Spytech spyware | EC Council Certified Cybersecurity Technician |
Man-in-the-Middle (MITM) Attack using Cain & Abel | EC Council Certified Cybersecurity Technician |
MAC Flooding using macof | EC Council Certified Cybersecurity Technician |
DoS Attack on a Target Host using hping3 | EC Council Certified Cybersecurity Technician |
SQL Injection Attack Against MSSQL to Extract Databases using sqlmap | EC Council Certified Cybersecurity Technician |
Parameter Tampering using Burp Suite | EC Council Certified Cybersecurity Technician |
Audit System Passwords using John-the-Ripper | EC Council Certified Cybersecurity Technician |
Social Engineering | EC Council Certified Cybersecurity Technician |
Crack a WPA2 Network using Aircrack-ng | EC Council Certified Cybersecurity Technician |
Hack an Android Device by Creating Binary Payloads | EC Council Certified Cybersecurity Technician |
Exploit Open S3 Buckets using AWS CLI | EC Council Certified Cybersecurity Technician |
Implement Access Controls in Windows Machine | EC Council Certified Cybersecurity Technician |
Manage Access Controls in Linux Machine | EC Council Certified Cybersecurity Technician |
Implement Role-Based Access Control in Windows Admin Center (WAC) | EC Council Certified Cybersecurity Technician |
Password Policies using Windows Group Policy | EC Council Certified Cybersecurity Technician |
Shodan,DNS Twist, DNS Dumpster | MyOSINT Open Source Intelligence Gathering |
Intelligence gathering , Data funnelling to process information into usable intel | Recorded Future Intelligence Fundamentals |
Mimecast ,Defender for 365 & Vipre mail security configuration + maintenance | Email Security Solutions |
Bit Defender,ESET,Defender for Endpoint AV, Heimdal deployment ,configuration, maintenance and support | Antivirus Solutions |
Cloud workloads migration to M365 using BitTitan | Cloud Workloads Migration With BitTitan |
Cloud workloads migration to M365 using AvePoint | Cloud Workloads Migration With AvePoint Fly |
Business workloads migration to M365 using Mover.io & Exchange admin centre migration | mover.io and EXO admin migration tools |
Azure IaaS & Azure Virtual Desktop design and deployment | IaaS and AVD |
Costing Azure solutions with the Azure cost calculator | Azure cost calculator |
Security awareness, ISO ,Phishing training content creating and staff training | Training and upskilling |
PFsense ,Sophos, Cyberoam, Cisco Meraki & ForcePoint Firewall deployment and maintenance | IDS,IPS,NIDS,NIPS, Firewall |
Meraki AP, UniFi , Alcatel ,Ruckus,TP link, Zyxel and Tenda AP deployment & maintenance | WLAN Solutions |
Bitwarden, Keeper Security & Keepass password manager implementation | password managers |
Standard operating procedure creation, training & implementation | Process documentation and management |
Technology training and training material design | Training and Teaching |
Documentation for knowledgebases | Documentation |
Standard operating procedure design and delivery | SOP |
Project management | Project management |
Lockpicking basics | Physical Security Testing |
Intune cloud only and hybrid deployment | Intune and MDM |
Exiv2 , Jimple | Image Metadata Extraction |
Pimeyes , Google Reverse Image Search, Smugmug | Reverse Image Search |
- Pwnagotchi
- Bad USB with Pico Pi & Circuit Python (Rick Roll, Credential Dump ,Reverse Shell)
- RPI 5 Kali Attack & Defence box (Kali Linux & Kali Purple)
- RPI 5 running docker ,Pi-hole with custom block lists,UniFi controller and LockKnife
- Kali Nethunter Non-Rooted Android device