Skip to content
View Topzdomain's full-sized avatar

Block or report Topzdomain

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Topzdomain/README.md

MasterHead

Hi πŸ‘‹, I'm Tony

πŸ‘¨β€πŸ’»πŸ”“ Cloud Security || Cybersecurity Security || Penetration Testing Enthuasiast


topzdomain

πŸ›‘οΈ Cybersecurity Projects:

Here are some of my notable cybersecurity projects. If you find them useful or like what I did, please give a star ⭐!

πŸ“Š Data Analytics Projects:

Here are some of my data analytics projects:

🌟 What I'm Currently Working On:

  • Enhancing my cybersecurity skills through hands-on labs and projects.
  • Exploring new technologies in cloud security
  • Preparing for the AWS Solutions Architect Exam

πŸ“¬ Connect with me:

LinkedIn

πŸ› οΈ Languages and Tools:

AWS Kali Linux Oracle VM Tenable Nessus Scanner Wazuh AWS Prowler HTML Metasploit Nmap

πŸ“Š GitHub Stats:

topzdomain

Β topzdomain

topzdomain

πŸ’¬ Feedback:

  • If you have any questions or suggestions, please open an issue or contact me!
  • If you like my work, please give a star ⭐ rating to my repositories.

Contact Me

You can reach me at Tony Olajide

Pinned Loading

  1. Accessing-a-Private-Subnet-Without-a-Bastion-Host Accessing-a-Private-Subnet-Without-a-Bastion-Host Public

    2

  2. Cybersecurity-Home-Lab-with-Active-Directory Cybersecurity-Home-Lab-with-Active-Directory Public

    PowerShell 1

  3. Setting-Up-an-RDS-Instance-With-Read-Replica Setting-Up-an-RDS-Instance-With-Read-Replica Public

    1

  4. Setting-up-Wazuh-on-AWS Setting-up-Wazuh-on-AWS Public

    1

  5. Using-Nessus-for-Vulnerability-Assessment-and-Remediation Using-Nessus-for-Vulnerability-Assessment-and-Remediation Public

    1

  6. Granting-Identity-Based-Access-to-S3-Bucket Granting-Identity-Based-Access-to-S3-Bucket Public

    1