Greetings! I'm Jubair Hasan Joy, and my fascination with the world of Internet Technology has been ingrained in me since the very beginning of my life. In just a few short years, I transitioned from fiddling with small button phones and watching box televisions to diving into the realm of smartphones. My inquisitive nature led me to explore the realm of Internet Technology, and I vividly remember accidentally bricking my dad's Galaxy J7 while attempting to gain root access, resulting in a well-deserved punishment. In my early teens, I also fearlessly disassembled my computer down to its bare bones, driven by an insatiable curiosity.
As the years passed, my knowledge expanded through platforms like YouTube, particularly channels such as Linus Tech Tips and Techquickie. My journey truly took off when I acquired a laptop in 2019, marking the commencement of my exploration into the tech world.
My first foray into programming involved learning Python, with a significant project being the creation of my own Discord bot. Inspired by a bot in rSlash's server, I delved into loops and APIs, mastering the utilization of YouTube, Instagram, and Discord APIs. Despite initially coding in Notepad and IDLE, a significant upgrade to 12GB of RAM allowed me to embrace more robust tools like VS Code and Atom.
Continuing my quest, I created and hosted a website on Github, experimenting with Microformats such as json-ld and vCards to enrich metadata. While my interest in this area eventually waned, a new passion emerged – curating a music library with meticulously inputted metadata using MusicBrainz. This journey culminated in the development of Spotipython, an early version that served its purpose, refined before its GitHub debut.
The discovery of Networkchuck on YouTube ignited a love for networking, seamlessly tying into my interests in cybersecurity and ethical hacking. This realization prompted a focused pursuit of knowledge in networking.
After overcoming numerous hurdles and completing various projects, I felt the need to validate my skills, leading me to pursue certificates. Presently, I proudly hold 45 from esteemed institutions like Cisco Networking Academy and Great Learning , showcasing my expertise in Networking, Network Security, Cyber Security, as well as proficiency in programming languages like Python, C, and Javascript. Additionally, I possess skills in Web Development (HTML, CSS, PHP), Digital Marketing (SEO, SEM, Social Media Marketing), and actively participate in extracurricular activities like Science Fairs.
As a distinguished alumnus of Bangladesh Elementary School , I graduated with a perfect GPA of 5.00 in SSC in 2022. Currently, I continue my academic journey at Halishahar Cantonment Public School & College . Currently, I'm contributing as a Content Marketer and Web Developer at Agamir Hashi . Furthermore, I am a Fortinet Certified Associate, which adds to my comprehensive skill set and solidifies my expertise in cybersecurity.
This is my GitHub repository where you will see some of the projects I have worked on:
-
Description: An open-source project for fetching Spotify track and album data programmatically using Python and the Spotify API.
-
GitHub Repository: Spotipython
-
Scripts:
- spotify_album.py: Fetches information about a Spotify album and its tracks.
- spotify_search.py: Searches for tracks on Spotify based on user input.
- spotify_client.py: Defines a SpotifyAPI class for handling authentication and making requests to the Spotify API.
- functions.py: Contains utility functions used in other files.
-
How to Use:
- Given in the Project's README.md file
-
Given by: Fortinet Training Institute
-
- Introduction to Fortinet and FortiGate
- Introduction to FortiGate and FortiOS
- Basic Configuration
- Operation and Day-to-Day Administration
- Antivirus Protection
- Application Control
- Authentication
- Cybersecurity Fundamentals
- Firewall Configuration
- Intrusion Prevention Systems (IPS)
- Intrusion Detection Systems (IDS)
- SSL Inspection
- Virtual Private Networks (VPN)
- Web Filtering
- Fortinet Security Fabric
- FortiGate Devices
- Security Policies
- IPSec VPNs
- NAT (Network Address Translation)
- FortiGuard Services
- Logging and Monitoring
- Fortinet NSE Certification
- Cybersecurity Best Practices
- Incident Response
- Vulnerability Management
- Compliance (PCI DSS, SOC 2)
- FortiOS Management
- Fortinet Analytics
- Cloud Security
- Advanced Threat Detection
-
Given by: IBM SkillsBuild
-
- Cyber threat groups
- Types of attacks
- Social engineering
- Case studies in cybersecurity
- Overall security strategies
- Cryptography
- Common approaches to prevent cyber attacks
- Detecting cyber attacks
- Responding to cyber attacks
- Awareness of the cybersecurity job market
- Cybersecurity concepts
- Cybersecurity objectives
- Cybersecurity practices
- Cybersecurity processes
- Cybersecurity risk management
- Cyber threat analysis
- Cyber threat intelligence
- Incident response
- Information security
- Security strategies
- Threat analysis
- Threat detection
- Vulnerability management
- Network security fundamentals
- Firewall configuration
- Intrusion detection systems (IDS)
- Intrusion prevention systems (IPS)
- Endpoint security
- Data encryption methods
- Public key infrastructure (PKI)
- Security information and event management (SIEM)
- Compliance and regulatory requirements
- Identity and access management (IAM)
- Ethical hacking and penetration testing
- Disaster recovery planning
- Business continuity planning
- Security policy development
-
Given by: Cisco Networking Academy
-
- Cybersecurity and Potential Impacts
- Most Common Cyber Threats
- Attacks and Vulnerabilities
- Protect oneself online
- How Organization protect themselves from this attacks
- Explore Different Career Options in Cyber Security
-
Given by: Great Learning
-
- Introduction to Firewall Concepts
- Role of Firewalls in Network Security
-
Given by: Great Learning
-
- Principles of Cryptography
- Hands-on Experience with Encryption Techniques
-
Given by: Great Learning
-
- Essentials of Securing Applications
- Best Practices in Application Security
-
Given by: Great Learning
-
- Understanding the Landscape of Cybercrime
- Analyzing the Impact of Cybercrime
-
Given by: Great Learning
-
- Fundamentals of Information Security
- Best Practices in Information Security
-
Given by: Great Learning
-
- Data Types, Classification and States
- Roles and Responsibilities of CEO, CFO, CBO
- Information Life Cycle
- Information and Information System Security Objectives
-
Given by: Great Learning
-
- Why is Cybersecurity important?
- Cyber attacks and threats
- Cybersecurity Strategy
- Threat Agents
- Cyber Kill Chain
- Cybersecurity in an Organization
-
Given by: Great Learning
-
- Spidering
- DIRB
- NMAP and GoBuster
- Enumeration
- Non standard Ports and Virtual Host
- Identifying Server Side Technology
-
Given by: Great Learning
-
- Malware
- Unrestricted File Uploads
- Remote Code Execution
- Web Malware Attack
- Web Malware Attack Stages
-
Given by: Great Learning
-
- Spidering
- DIRB
- NMAP and GoBuster
- Enumeration
- Non standard Ports and Virtual Host
- Identifying Server Side Technology
- Malware
- Unrestricted File Uploads
- Remote Code Execution
- Web Malware Attack
- Web Malware Attack Stages
- SQl Injection
- Command Injection
-
Given by: Great Learning
-
- Cryptography
- Encryption
- Decryption
- Types of Encryption
- Encryption Algorithms and Protocols
- Brute Force Attacks
- Assymetric Encryption
- Symetric Encryption
- AES
- RSA
-
Given by: Cisco Networking Academy
-
- Understanding Application Layer Services
- Exploring Binary Systems
- Configuring Cisco Devices
- Working with Cisco IOS
- Configuring Cisco Routers and Switches
- Introduction to Cloud Services
- Implementing Copper and Fiber Cabling
- Documentation Best Practices
- Managing Endpoint Devices
- Understanding Ethernet Protocols
- Providing Help Desk Support
- Implementing Hierarchical Network Design
- IP Addressing (IPv4 and IPv6)
- Protocols at the Network Layer
- Media Types in a Network
- Troubleshooting Network Issues
- Exploring Different Network Types
- Understanding Protocols and Standards
- User Support Techniques
- Introduction to Transport Layer Protocols
- Advanced Troubleshooting Methods
- Wireless Access Technologies
-
Given by: Cisco Networking Academy
-
- Effective Reading of Documentation
- Endpoint Device Management
- Providing Help Desk Support
- Advanced Network Troubleshooting
- Customer Support Strategies
- User Support Best Practices
-
Given by: Cisco Networking Academy
-
- Network Communication Concepts
- Importance of Standards and Protocols
- Ethernet Networks Communication
- IP Address Features (IPv4)
- IPv6 Addressing
- Routers and Network Connectivity
- Network Testing and Troubleshooting
- Configuration of Integrated Wireless Router
- Wireless Client Configuration
-
Given by: Cisco Networking Academy
-
- Impact of IOT and Transformation in business and governments
- Importance of Software and Data for digital business and society
- Benefits of Artificial Intelligence and Digital Transformation
- Intent Based Networking
- Enhanced Security in Digitized World
-
Given by: Great Learning
-
- Fundamentals of Computer Networking
- Understanding Network Protocols
-
Given by: Great Learning
-
- Various Types of Network Security Measures
- Expertise in Network Security Practices
-
Given by: Great Learning
-
- Various Types of Network Security Measures
- Expertise in Network Security Practices
-
Given by: Great Learning
-
- Introduction to AWS and Networking Services
- Understanding Amazon VPC
- Understand Cloud Computing
- Understanding Cloud Networking
-
Given by: Cisco Networking Academy
-
- Installing Components for Personal Computers
- Building, Repairing, or Upgrading Personal Computers
- Describing Common Device Hardware
- Preventive Maintenance for Personal Computers
- Features and Functions of Laptops
- Features and Functions of Mobile Devices
- General Safety Standards
- Fire Safety Standards
-
Given by: Cisco Networking Academy
-
- Purpose and characteristics of operating systems
- Basic operating system security implementation
- Configuration of mobile device network connectivity
- Configuration of mobile device email
- Android operating system fundamentals
- iOS operating system fundamentals
- Linux operating system fundamentals
- Windows operating system fundamentals
- File management basics
- User management in operating systems
- Network services and protocols
- Operating system updates and patches
- Troubleshooting common operating system issues
-
Given by: Great Learning
-
- Basic Concepts of Programming
- Syntax and Structure of the C Language
- Introduction to Variables and Data Types
- Control Flow and Looping Structures
- Functions and Modular Programming
-
Given by: Great Learning
-
- ChatGPT
- How to program with ChatGPT
- How to interpret python with ChatGPT
- How to debug with ChatGPT
- Add Exception handling to code using ChatGPT
- GPT 3.5 vs GPT 4
- ChatGPT vs Github Copilot
- Upload and Download programs and files with ChatGPT
-
Given by: Great Learning
-
- HTML Fundamentals
- Structuring Web Documents
- Working with Forms and Input Elements
- Creating Hyperlinks and Navigation
-
Given by: Great Learning
-
- HTML Fundamentals
- Structuring Web Documents
- Working with Forms and Input Elements
- Creating Hyperlinks and Navigation
- HTML Table
- HTML Tag Anatomy
- HTML Links
- HTML Attributes
- Closing Tag, Element, Content
-
Given by: Great Learning
-
- HTML Attributes
- Closing Tag, Element, Content
- HTML Anatomy
-
Given by: Great Learning
-
- PHP Fundamentals
- PHP Variables and Variable Scope
- Echo and Print Statements
- Loops, Operators, Strings, Functions and Arrays
-
Given by: EF Standard English Test
-
- Can understand with ease virtually everything heard or read.
- Can summarize information from different spoken and written sources, reconstructing arguments and accounts in a coherent presentation.
- Can express him/herself spontaneously, very fluently and precisely, differentiating finer shades of meaning even in the most complex situations.
- Discuss issues related to science and technology, including robots and new inventions.
- Talk about celebrities, celebrity activism and gossip about celebrities.
- Use a variety of techniques for promoting creativity in your speech and writing.
- Discuss financial planning and give and understand advice about personal finance.
- Talk about stress in your life and the lives of friends and colleagues.
- Discuss techniques for doing research on a wide range of topics.
-
Given by: Cisco Networking Academy
-
- Adverbs
- Compilers and Interpreters Vocabulary
- Fraudulent Calls Vocabulary
- Future Perfect
- Idiomatic Phrases
- Imperative Instruction
- Information Security Policy
- Inversion
- Job Roles and Responsibilities
- Modal Verbs
- Network and Software Engineering Vocabulary
- Passive Voice
- Past Simple
- Relative Pronouns
- Supplier Evaluation Modules
- User Experience Vocabulary
-
Given by: Cisco Networking Academy
-
- Advanced Modal Verbs
- Advanced Tenses
- Cleft Sentences
- Cloud Computing Vocabulary
- Conjunction
- Customer Support Vocabulary
- Logical Deductions
- Networking Vocabulary
- Polite Requests
- Sharing Feedback Vocabulary
- Software Vocabulary
- Subjunctive Mood
- 'They' as singular
- Updating Colleagues Vocabulary
-
Given by: Great Learning
-
- Improving Spoken English Communication
- Effective Communication Strategies
-
Given by: Great Learning
-
- Writing Business Emails
- Business Presentation
- Attending Job Intervies
- Buisness English for Negotiation
- Buisness English
- Commonly used acronyms in Buisness
-
Given by: Udemy
-
- What is the meaning of a Letter?
- Why do we write letters?
- What is the importance of letter writing skills?
- What type of letter should you write?
- What are the various types of letters?
- Differentiate between Formal Letters and Informal Letters
- Format of Formal and Informal Letters
- Important tips for good letter writing
- Some popular abbreviations used in formal letters
- Various types of formal letters
- MCQs related to Formal and Informal letters
-
Given by: Great Learning
-
- What is Digital Marketing?
- Why Digital Marketing?
- How To Do Digital Marketing?
- Types Of Digital Marketing
- Content Marketing
- SEO
- SEM
- Social Media Marketing
- Automated Marketing
- Affiliate Marketing
- Pay per click
- Public Relations
- YouTube SEO Optimization
-
Given by: Great Learning
-
- Introduction to Search Engine Optimization
- Basic SEO Strategies
- Keyword Research and Optimization
-
Given by: Great Learning
-
- Advanced SEO Tactics
- Link Building Strategies
- SEO Analytics and Measurement
-
Given by: Great Learning
-
- Introduction to Designing an app
- UX vs UI
- UX Process
- UX Tools
-
Given by: Great Learning
-
- What is Social Media Management?
- Why Practice Social Media Management
- Top Social Networks for Social Media Management
- Best Social Media Management Tools
- How to get started with Social Media Management?
- Why Invest in Social Media Management?
-
Given by: Great Learning
-
- Introduction to Designing an app or website
- UX vs UI
- UX Process
- UX Tools
- Wireframing
-
Given by: Cisco Networking Academy
-
- Engaging Stakeholders
- Defining Stakeholders
- Value of Stakeholders
- Stakeholder Classification
- Stakeholder Analysis
- Power-Interest Grid
- Interviewing Stakeholders
- Trust Building
- Active Listening
- Interview Techniques
- Effective Relationships
- Communication Strategies
- Project Management
- Adapting Communication
- Cultural Sensitivity
- Innovative Approaches
- Sustainability
- Legal Aspects
-
Given by: Cisco Networking Academy
-
- Why reports are valuable in business contexts
- Selecting appropriate tone for reports
- Identifying key points of relevance
- Organizational structure for reports
- Communicating specific messages to a particular audience
- Scenario-based interactions
- Immersive branching scenarios
- Determining Relevance
- Report Audience
- Report Purpose
- Report Tone
- Data visualization techniques
- Effective use of graphics and charts
- Interpreting data for different audiences
- Formatting and layout principles
- Using storytelling techniques in reports
- Analyzing and incorporating feedback
-
Given by: Bangladesh Elementary School
-
- Project: Electromagnets and their properties and their usage in detecting fake coins
- Project Planning and Execution
- Scientific Methodology
- Presentation and Communication Skills