Skip to content

In this portfolio there are various projects that cover an array of cybersecurity topics. They provided an opportunity to gain a deeper understanding and develop necessary technical skills.

Notifications You must be signed in to change notification settings

IreneMakonnen/Irene_Portfolio

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

91 Commits
 
 
 
 

Repository files navigation

Irene_Cybersecurity_Portfolio

Professional Statement

I am an adaptable and organized individual with strong time management skills, committed to clear and effective communication. My passion for cybersecurity stems from its dynamic nature, where technical and problem-solving skills are constantly applied to safeguard individuals and organizations from evolving threats. I value honesty and respect, and I strive to maintain these principles in my work, ensuring the confidentiality, integrity, and protection of sensitive information.

Sources of Projects

Google Cybersecurity Professional Certificate

I successfully completed an 8-course Google Cybersecurity Certificate program, where I gained hands-on experience with essential tools and techniques.

Throughout my studies, I developed technical skills such as Python, Linux, SQL, Security Information and Event Management (SIEM) tools, Intrusion Detection Systems (IDS), as well as key soft skills like Communication, Collaboration, Analysis and Problem-solving.

Below you'll find an overview of the projects I worked on, detailing the skills acquired, the methodologies applied, and the technologies used in simulated cybersecurity scenarios.

PROJECTS COVERED
Course Topic Skills Gained Project
1. Manage Security Risks INFOSEC, NIST RMF, NIST CSF, Security Audits, Incident Response Playbooks 1.1 Conducting a Security Audit
2. Networks and Network Security Security Hardening, Network Security, TCP/IP, Network Architecture, Cloud Networks 2.1 Analyzing network layer communication
2.2 Analyzing network attacks
2.3 Application of OS hardening techniques
2.4 Analysis of network hardening
2.5 Using the NIST CSF to respond to security incident
3. Linux and SQL Command Line Interface (CLI), SQL, Linux, Bash 3.1 Using Linux commands to manage file permissions
3.2 Applying filters to SQL queries
4. Assets, Threats, and Vulnerabilities Authentication, Vulnerability assessment, Cryptography, Asset classification, Threat analysis 4.1 Classifying the assets connected to a home network
4.2 Scoring risks based on their likelihood and severity
4.3 Determining appropriate data handling practices
4.4 Improving authentication, authorization, and accounting for a small business
4.5 Analyzing a vulnerable system for a small business
4.6 Identifying the attack vectors of a USB drive
4.7 Applying the PASTA threat model framework
5. Detection and Response SIEM tools, Packet Analyzer, IDS 5.1 Documenting incidents with an incident handler's journal
5.2 Analyzing a packet with Wireshark
5.3 Capturing a packet with tcpdump
5.4 Examining alerts, logs, and rules with Suricata
5.5 Performing a query with Splunk
5.6 Performing a query with Chronicle
6. Automate Cybersecurity Tasks with Python Computer Programming, Python Programming, Coding, PEP 8 style guide 6.1 Updating a file through a Python algorithm

Other Projects

An opportunity to hone my skills as well as gain new ones in the various projects I undertook. Links are provided below for a more detailed review.

PROJECTS COVERED
Project Explanation Skills
Implement Caesar Cipher A Python program that can encrypt and decrypt text using the Caesar Cipher algorithm Python, Cryptography
Pixel Manipulation for Image Encryption
Password Complexity Checker
Simple Keylogger
Network Packet Analyzer

About

In this portfolio there are various projects that cover an array of cybersecurity topics. They provided an opportunity to gain a deeper understanding and develop necessary technical skills.

Topics

Resources

Stars

Watchers

Forks