With Good Soft Skills:
Ethical and Legal Awareness
Time Management
Active Listening
Creativity
Read More
Processing and resolving reported issues, especially those requiring physical access or related to hardware, and managing most aspects related to physical security, hardware changes, and repairs.
Scope : Network - Infrastructure - Physical
Sections : Vulnerability - CVSS - Description - Risks - Solutions - Recommendations
+Leaked Emails Passwords
While Penetration Test, I detect an attack by a virus (Trojan) where the company's devices are used as zombies in DDOS attacks (denial-of-service).I responded to the attack and solved it...
A strong focus on the fields of cybersecurity (Cyber Security, SOC Analyst, Penetration Testing, Digital Forensics) aiming to become a SOC Analyst, along with studying the fundamentals and requirements in Networking, Operating System, Automation, Virtualization, and Cloud. This includes proficiency with numerous tools for defense and offense purposes.
CCNA 1 / 2, Binary Math, Hardware, IT Essentials, Office, Windows, Linux
2019 - 2020
2020 - 2021
2021 - 2022
2022 - 2023
100%
100%
100%
100%
100%
63%
61%
37%
Cyber Security - Analyst SOC - Penetration Testing - Digital Forensics - Tools(MetaSploit -OSINT -ELK -Velociraptor -MITRE ATT&CK -Maltego -Autopsy -Nessus -Nmap) - Methodologies(OSSTMM -PTES -OWASP -ISO27001/27005/27035 -Kill Chain -NIST 800-61 R2) - Operating-System(Kali LinuX -Windows Server/Client -Ubuntu) - Attacks(Phishing -DOS -BufferOverFlow -RansomWare -Trojan -Malware -BruteForce -CryptoJacking...)
CCNA 1 / 2, Binary Math, Hardware, IT Essentials, Office (Word - Excel - PowerPoint), Linux
CyberSecurity Threats, vulnerabilities and Attacks -Prancipals, Practics and Processes -System and network Defense -Defending the Entreprise -CyberSecurity Operations -Incident Response -Asset and Risk Management -Governance and Compliance
Network Security Fundamentals -Identification,Authentication,Authorization -Network Security:Administrative/Physical/Technical Controls -Virtualization/Cloud Computing/Wireless/Mobile Device/IoT/Cryptography/Data Security -Network Traffic Monitoring.
Information Security/Ethical Hacking/Penetration Testing Fundamentals -Threats and Vulnerability Assessment -Cloud Computing Threats/Password Cracking/Social Engineering/Network/Web Application/Wireless/Mobile/IOT Attacks techniques and Countermeasures
Computer Forensics Fundamentals/Investigation Processes -Understanding Hard Disks -Data Acquisition and Duplication -Defeating Anti-Forensics -Windows/Linux Forensics -Network/Dark Web Forensics -Investigating Web Attacks/Email Crimes -Malware Forensics.
Computer Programming - Data Types,Variables,Operators,1/0 -Boolean,Conditional,Execution,Loops,Lists,Logical Bitwise Operations -Functions,Tuples,Dic,Exceptions,Data Processing
Working in Linux -Command Line Skills -Filesystem -Managing Files and Directories -Archiving and Compression -Basic Scripting -Hardware -Where Data is Stored -Network Configuration -System and User Security -Users and Groups -Ownership and Permissions
Network Support, Cybersecurity Threats, Vulnerabilities, and Attacks, Network Security,
Personal Computers, Laptops, Other Mobile Devices