Cyber Security
Welcome to the Cyber Security section. Here I have listed some of the cyber security projects I have done and related skills gained.
Graduation project in Penetration testing
My graduation project was in Cyber Security field and related to penetration testing of a management system in the company KMWE. The project was confidential and the results cannot be shared.
Honeypots
During semester 7, we developed a honeypot with the goal to collect intelligence about the motives and methods of adversaries targeting industrial control systems.
Security testing for IoT communication protocols based on MQTT
During this project I developed Automated Security Tests. This project was also confidential and the results cannot be shown.
Knowledge of different OS
Kali Linux was used for penetration testing, ethical hacking and lots of security assessments. Ubuntu was also used as it serves as a secure choice for network servers and secure development environments. Windows Servers were also used through my journey.
Ethical hacking and Penetration Testing
Gained knowledge of ethical hacking techniques and penetration testing methodologies to identify and exploit vulnerabilities in systems and applications before malicious hackers can exploit them.
Penetration Testing & Social Engineering
During this project I did a penetration testing of an external Canvas functionality. This also included phishing attack on the employees. The work was confidential.
Incident Response and Forensics
Developed skills in detecting and responding to cybersecurity incidents, as well as conducting digital forensics to investigate and analyze security breaches.
Information Security Governance
Good understanding of the policies, procedures, and frameworks necessary to implement and manage effective information security programs within an organization.
Cryptography
Knowledge of cryptographic algorithms, encryption, and decryption techniques used to secure data and communications.
Web Application Security
Familiarity with securing web applications against common vulnerabilities such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF).
Threat Intelligence
Staying up-to-date with the latest cybersecurity threats and trends to proactively assess and defend against potential attacks
Risk Assessment and Management
Identifying and assessing cybersecurity risks and implementing risk management strategies to mitigate potential threats.
Social Engineering
Recognizing and mitigating social engineering attacks, such as phishing and pretexting. Also creating Social Engineering attacks.
IoT Security
Understanding the unique security challenges posed by the Internet of Things (IoT) devices and implementing appropriate security measures.