Click below to view the official PDF certifications.
| Google Cybersecurity Professional | IT Fundamentals (FC0-U71) |
|---|---|
Udemy Training |
|
| π View Google PDF | π View Udemy PDF |
Governance, Risk & Compliance
Objective: Conducted a comprehensive internal audit to identify security gaps and misalignments using the NIST Cybersecurity Framework (CSF).
- Action: Evaluated current security posture against industry standards to ensure organizational compliance.
- Evidence: π View Audit & Compliance Checklist
- Certification: π Google: Play It Safe - Manage Security Risks
Network Security & Forensics
Objective: Utilized
tcpdumpto capture and analyze network layer communication to resolve connectivity issues.
- Action: Successfully identified "destination port unreachable" errors by isolating DNS issues on UDP Port 53.
- Evidence: π View Traffic Analysis Report
- Certification: π Google: Connect and Protect - Network Security
Verified Credential: π Google Certificate: Tools of the Trade
This project serves as a comprehensive technical portfolio demonstrating my ability to secure Linux systems and perform data forensics using SQL. This work was completed as part of the Google Cybersecurity Professional Certificate.
User Management & Permissions
Objective: Enforce the Principle of Least Privilege (PoLP) by managing user access and system permissions.
- Action: Created and managed user accounts and modified file permissions/ownership to secure the environment.
- Evidence:

Software & Update Security
Objective: Secure the system by managing software installations and maintaining up-to-date security tools.
- Action: Utilized the
APTpackage manager to install, update, and verify the integrity of security tools. - Evidence:

Threat Hunting & Forensics
Objective: Proactively hunt for malicious activity and unauthorized access patterns within system logs.
- Action: Filtered large datasets using
grepto isolate critical security events and identify potential threats. - Evidence:

Core Administration Skills
- Skills: Proficient in File Management (
mv,cp,rm), System Navigation (find,locate), and Technical Documentation (manpages).
Database Auditing
Objective: Identify unauthorized access attempts and suspicious patterns within a relational database.
- Action: Wrote SQL queries using
WHEREclauses andLIKEwildcards to filter access logs for security auditing. - Evidence:

Forensic Data Correlation
Objective: Correlate disparate data sources to track threat actors and reconstruct security incidents.
- Action: Utilized
AND/OR/NOTlogic andINNER JOINoperations to merge user data with login tables for deeper investigation. - Evidence:

This folder serves as a comprehensive portfolio for the "Assets, Threats, and Vulnerabilities" course. It documents the full security lifecycle: identifying assets, assessing risks, remediating incidents, and applying cryptographic controls.
Official validation of skills in NIST standards, risk management, and cryptography.
π View Course Certificate
Governance, Risk & Compliance
Objective: Establish a formal audit baseline by identifying, categorizing, and valuing all organizational hardware and software assets to determine appropriate protection levels.
- Action: Created a centralized inventory tracking system, assigned data criticality levels, and mapped network-connected assets to business-critical functions.
- Evidence: π View Asset_Inventory.csv
Threat Modeling & Risk Prioritization
Objective: Conduct a quantitative risk analysis using Likelihood Γ Impact scoring to prioritize remediation and align security resources with the highest business risks.
- Action: Developed a risk-scoring matrix to identify high-probability threats, establishing a technical foundation for implementing NIST-aligned security controls.
- Evidence: π View Threat_Risk_Matrix.csv
GRC Auditing & NIST Compliance
Objective: Investigate a security breach to determine the root cause of a data leak and implement corrective technical controls based on NIST SP 800-53.
- Action: Analyzed the leak's impact on data confidentiality, drafted a formal incident report, and recommended NIST AC-6 (Least Privilege) for future prevention.
- Evidence: π View Data_Leak_Incident_Analysis_Report.pdf
Cryptography & Data Protection
Objective: Mitigate the risk of unauthorized data exposure by implementing industrial-grade cryptographic handling for sensitive "Data at Rest" and "Data in Transit".
- Action: Evaluated the organizational security posture, utilized AES encryption/decryption tools to secure records, and successfully validated ciphertext recovery.
- Lab Evidence:

Asset Verification & Non-Repudiation
Objective: Ensure the absolute integrity of organizational assets by leveraging hash functions to verify that files remain unaltered by unauthorized actors.
- Action: Generated and compared SHA-256 cryptographic hash values for business-critical data sets to detect unauthorized tampering and ensure authenticity.
- Lab Evidence:

Identity Management & Authorization
Objective: Reduce the organizational attack surface by strengthening Authentication, Authorization, and Accounting (AAA) protocols for network resources.
- Action: Designed an access control mitigation worksheet to enforce Multi-Factor Authentication (MFA) and granular, role-based permission levels.
- Evidence: π View 6_Access_Control_Mitigation_Worksheet.pdf
Risk Management Framework (RMF)
Objective: Conduct a systematic internal audit to identify technical security gaps and prioritize remediation using the NIST Cybersecurity Framework (CSF).
- Action: Performed a comprehensive vulnerability scan, identified high-risk entry points, and provided actionable remediation steps aligned with NIST standards.
- Evidence: π View 7_Vulnerability_Assessment_Report.pdf
Physical Security & Threat Forensics
Objective: Evaluate the security risks posed by unauthorized removable media and social engineering-driven malware delivery.
- Action: Isolated and analyzed attack paths involving physical USB drives, focusing on malware propagation and unauthorized data exfiltration methods.
- Evidence: π View 8_USB_Attack_Vector_Analysis.pdf
Strategic Defense & Attack Simulation
Objective: Apply the 7-stage PASTA framework to simulate sophisticated attack paths and align technical defenses with business objectives.
- Action: Modeled SQL Injection exploitation paths against a mobile application to recommend defenses like Parameterized Queries and PKI.
- Evidence: π View 9_PASTA_Threat_Model_SneakerAPP.pdf
This folder serves as a comprehensive portfolio for the "Detection and Response" module. It documents technical proficiency in identifying security incidents, analyzing network traffic, and performing forensic packet inspection.
Note: This folder documents my technical progression through Course 4, focusing on incident detection frameworks and deep-packet analysis.
Official validation of skills in NIST standards, risk management, and cryptography.
π View Course Certificate
Incident Response & Business Continuity
Objective: Analyze a simulated ransomware attack on a healthcare clinic to determine the impact on patient care and business operations.
- Action: Developed a formal incident overview by following the NIST Incident Response lifecycle, identifying risks to patient data and recommending immediate containment steps.
- Evidence: π View Incident_Handlers_Journal.pdf
Network Traffic Analysis & Forensic Inspection
Objective: Perform Deep Packet Inspection (DPI) to identify indicators of compromise (IoCs) and verify TCP protocol integrity.
- Action: Utilized Wireshark to analyze a
.pcapfile, isolating TCP Port 80 traffic and confirming "Complete, WITH_DATA" status to verify successful data exchange. - Lab Evidence:

Figure 3: Detailed inspection of the TCP header identifying source/destination ports and conversation completeness.
Command-Line Traffic Analysis & Forensic Inspection
Objective: Identify active network interfaces and utilize the
tcpdumputility to capture, filter, and inspect live packet payloads within a Linux environment.
- Action: Mapped hardware interfaces via
ifconfig, intercepted real-time HTTP traffic oneth0, and performed advanced forensic filtering using hexadecimal and ASCII output formats to verify protocol integrity.
Figure 4: Command-line interface packet capture showing deep packet inspection and payload analysis.
- Evidence: π View tcpdump Analysis in Journal
Email Artifact Analysis & Forensic Escalation
Objective: Identify high-risk indicators within suspicious email artifacts and perform a formal escalation of an infected workstation alert.
- Action: Analyzed email headers for sender mismatches, identified social engineering red flags ("Egnieer"), verified a malicious SHA256 file hash, and updated the incident ticket status to Escalated.
Figure 5: Identification of suspicious sender domain, grammatical errors, and malicious attachment hash.
Figure 6: Alert ticket updated to Escalated status with professional analyst documentation.
Evidence: π View Phishing Analysis in Journal
Suricata IDS Alerting & JSON Metadata Parsing
Objective: Investigate network security events by executing Suricata against packet captures to identify signature-based triggers and validate IDS rule effectiveness.
- Action: Deployed Suricata in read-pcap mode, analyzed
fast.logfor immediate alerts, and utilizedjqto parse theeve.jsontelemetry for deep-flow analysis of Port 80 traffic.
"Date: January 3, ","Entry: #5 " "2026. ", "Description ","Conducted a forensic review of network traffic by running Suricata against a sample.pcap file. Analyzed both standard alerts in fast.log and detailed JSON telemetry in eve.json to verify signature triggers." "Tool(s) used ","Suricata IDS, Linux CLI, cat, jq" "The 5 W's ","β’ Who: Cybersecurity Analyst / SOC Team." ,"β’ What: Identified ""GET on wire"" HTTP alerts and parsed log metadata." ,"β’ When: During active network traffic inspection using read-pcap mode." ,"β’ Where: Communication between local IP 172.21.224.2 and external IP 142.250.1.139." ,"β’ Why: To validate the effectiveness of custom IDS rules in detecting outbound HTTP requests."
Figure 7: Inspection of fast.log identifying "GET on wire" alerts with Signature ID: 12345.
Figure 8: Refined jq query extracting flow-specific metadata and destination IPs from eve.json.
Evidence: π View IDS Analysis in Journal
Wazuh Threat Hunting & Log Correlation
Objective: Execute a targeted threat hunt using SIEM logic to isolate unauthorized brute-force patterns within a 100,000+ event dataset.
- Action: Configured Wazuh KQL filters to monitor the www3 host, successfully identified 300+ root-level authentication failures, and correlated SIEM alerts with raw
secure.logdata to verify the attack vector.
"Date: January 4, ","Entry: #6 " "2026. ", "Description ","Simulated Threat Hunt: Analyzed historical security telemetry from the Buttercup Games dataset using the Wazuh dashboard to isolate unauthorized access attempts." "Tool(s) used ","Wazuh SIEM, Kibana Query Language (KQL)" "The 5 W's ","β’ Who: Potential malicious actors or automated scripts." ,"β’ What: Identified over 300 failed SSH login attempts for the ""root"" account. ,"β’ When: Historical activity captured within the logs." ,"β’ Where: The www3 web server." ,"β’ Why: Brute-force attack pattern targeting administrative credentials."
Figure 9: Manual forensic verification of raw secure.log artifacts confirming the brute-force attempt.
Evidence: π View SIEM Analysis in Journal
Google Cybersecurity Professional Certificate | Technical Portfolio
Official validation of skills in NIST standards, risk management, and cryptography.
Google Python Automation Specialist
Objective: Mastered Python fundamentals to automate security workflows, parse complex log files, and develop remediation algorithms.
"Date: January 5, 2026", "Entry: #1", "Tool(s) used: Python 3.x, VS Code, Jupyter" Credential: π View Professional Certificate
Conditional Logic & Data Correlation
Objective: Connect users to their assigned devices by cross-referencing usernames with hardware IDs to detect unauthorized system access.
- Action: Created an automated verification function using
.index()and nestedif/elsestatements to confirm if a user is operating their designated equipment.
"Date: January 5, 2026", "Entry: #2" "Description: Algorithmic verification of user-device affinity to prevent hardware misuse." "Tool(s) used: Python (Conditional Statements, List Indexing)" "The 5 W's: β’ Who: Internal employees and assigned hardware assets. β’ What: Automated check for hardware-to-user alignment. β’ When: System login or hardware audit phase. β’ Where: Corporate network infrastructure. β’ Why: To prevent unauthorized users from accessing the system on unassigned devices."
Evidence: π§ͺ View Verification Lab Analysis
Regular Expressions & Log Parsing
Objective: Execute a targeted extraction of device IDs and IP addresses from login logs to identify vulnerabilities.
- Action: Configured
re.findall()patterns to isolate devices requiring critical software updates and correlate flagged IP addresses.
"Date: January 4, 2026", "Entry: #3"
"Description: Used Regular Expressions to automate the identification of outdated systems and malicious IPs."
"Tool(s) used: Python re Module"
"The 5 W's:
β’ Who: Potential malicious actors and outdated network devices.
β’ What: Automated extraction of specific device IDs and IP addresses.
β’ When: Scheduled log monitoring and vulnerability scanning.
β’ Where: System login attempts and device logs.
β’ Why: To automate the detection of security vulnerabilities and brute-force attempts."
Evidence: π§ͺ View Regex Pattern Analysis
File I/O & String Manipulation
Objective: Automate the process of importing and parsing large text-based security logs to extract specific login attempt data.
- Action: Utilized the
.read()and.split()methods to transform raw text file data into manageable lists for security analysis.
"Date: January 5, 2026", "Entry: #4" "Description: Developed scripts to efficiently access and parse information from text-based security logs." "Tool(s) used: Python (File Handling, String Methods)" "The 5 W's: β’ Who: Security analysts managing large log datasets. β’ What: Processed login data to extract specific fields. β’ When: During routine security log reviews. β’ Where: Organization's internal security database. β’ Why: To allow analysts to efficiently access information from text files."
Evidence: π§ͺ View Log Parsing Lab Analysis
File Handling & Remediation Logic
Objective: Develop a Python algorithm to automate the removal of unauthorized IP addresses from a restricted healthcare access file.
- Action: Implemented
with open()for secure file access, utilized.split()for data parsing, and built aforloop with.remove()logic to programmatically purge unauthorized IPs.
"Date: January 5, 2026", "Entry: #5" "Description: Technical foundation for automated maintenance of an IP 'allow list'." "Tool(s) used: Python (File I/O, List Methods)" "The 5 W's: β’ Who: Security Analyst at a Healthcare organization. β’ What: Removed unauthorized IP addresses from the allow_list.txt file. β’ When: Real-time update during the access review process. β’ Where: Restricted subnetwork server. β’ Why: To maintain data privacy and system integrity by revoking access for unauthorized users."
Evidence: π§ͺ View Algorithmic Logic Lab Analysis
Advanced Remediation Algorithm
Objective: Execute an automated remediation workflow to secure a restricted healthcare subnetwork by programmatically updating access permissions.
- Action: Developed a modular Python script that parses server logs, identifies unauthorized entries, and rewrites the permission file to ensure 100% compliance with access policies.
"Date: January 5, 2026", "Entry: #6" "Description: FINAL PORTFOLIO PROJECT: A comprehensive security automation tool for managing server access." "Tool(s) used: Python, File I/O, List Manipulation" "The 5 W's: β’ Who: Senior Security Analyst. β’ What: Automated the cleanup of a restricted IP allow list. β’ When: Project completion phase of the Python Automation course. β’ Where: Healthcare Network Infrastructure. β’ Why: To demonstrate professional-grade automation and secure data handling."
Evidence: π View Numbered Portfolio Report
Google Cybersecurity Professional Certificate | Professional Growth Portfolio
Credential: π View Job Preparation Certificate
Official validation of skills in NIST standards, risk management, and professional readiness.
Objective: Translate technical proficiency into professional value by aligning hands-on experience with the NIST Cybersecurity Framework (CSF).
- Action: Created a professional narrative by mapping technical lab activities (Python automation, SIEM analysis) to the Identify, Protect, Detect, Respond, and Recover functions of the NIST CSF.
"Entry: #1", "Focus: Professional Readiness & Portfolio Strategy" "The 5 W's: β’ Who: Aspiring Cybersecurity Analyst. β’ What: Strategic alignment of technical skills with organizational security goals. β’ When: Career preparation and job market entry phase. β’ Where: Professional networking platforms and technical portfolios (GitHub/LinkedIn). β’ Why: To bridge the gap between "learning a skill" and "solving business security risks" for hiring managers."
Credential: π View AI Strategy Certificate
Official validation of skills in Generative AI for professional workflow optimization.
Objective: Leverage Generative AI tools to enhance the quality of technical documentation and increase efficiency in the job application lifecycle.
- Action: Mastered prompt engineering techniques to refine technical summaries, optimize resumes for Applicant Tracking Systems (ATS), and practice technical interview scenarios using AI as a simulator.
"Entry: #2", "Focus: Generative AI & Productivity" "The 5 W's: β’ Who: Tech-forward Security Professional. β’ What: Application of Generative AI for professional branding and technical writing. β’ When: Advanced job search and interview preparation phase. β’ Where: Technical documentation and professional communications. β’ Why: To stay competitive in a tech-driven market and demonstrate the ability to use AI for operational efficiency."
β¬ οΈ Back to GiftTech Main Page


