Cyber Security

Welcome to the Cyber Security section. Here I have listed some of the cyber security projects I have done and related skills gained.

Graduation project in Penetration testing

My graduation project was in Cyber Security field and related to penetration testing of a management system in the company KMWE. The project was confidential and the results cannot be shared.

Honeypots

During semester 7, we developed a honeypot with the goal to collect intelligence about the motives and methods of adversaries targeting industrial control systems.

Security testing for IoT communication protocols based on MQTT

During this project I developed Automated Security Tests. This project was also confidential and the results cannot be shown.

Signify
Signify
Knowledge of different OS

Kali Linux was used for penetration testing, ethical hacking and lots of security assessments. Ubuntu was also used as it serves as a secure choice for network servers and secure development environments. Windows Servers were also used through my journey.

Ethical hacking and Penetration Testing

Gained knowledge of ethical hacking techniques and penetration testing methodologies to identify and exploit vulnerabilities in systems and applications before malicious hackers can exploit them.

closeup photo of eyeglasses
closeup photo of eyeglasses
Penetration Testing & Social Engineering

During this project I did a penetration testing of an external Canvas functionality. This also included phishing attack on the employees. The work was confidential.

Incident Response and Forensics

Developed skills in detecting and responding to cybersecurity incidents, as well as conducting digital forensics to investigate and analyze security breaches.

Information Security Governance

Good understanding of the policies, procedures, and frameworks necessary to implement and manage effective information security programs within an organization.

Cryptography

Knowledge of cryptographic algorithms, encryption, and decryption techniques used to secure data and communications.

Web Application Security

Familiarity with securing web applications against common vulnerabilities such as SQL injection, cross-site scripting (XSS), and cross-site request forgery (CSRF).

Threat Intelligence

Staying up-to-date with the latest cybersecurity threats and trends to proactively assess and defend against potential attacks

red padlock on black computer keyboard
red padlock on black computer keyboard
Risk Assessment and Management

Identifying and assessing cybersecurity risks and implementing risk management strategies to mitigate potential threats.

turned on monitoring screen
turned on monitoring screen
Social Engineering

Recognizing and mitigating social engineering attacks, such as phishing and pretexting. Also creating Social Engineering attacks.

Phishing
Phishing
IoT Security

Understanding the unique security challenges posed by the Internet of Things (IoT) devices and implementing appropriate security measures.

IoT
IoT