Skip to content

Hi! I’m Abdullahi Abdinoor Mohamed, and this is my cybersecurity portfolio. Here, I showcase my hands-on experience, projects, and knowledge in the field of cybersecurity, ethical hacking, and IT security.

Notifications You must be signed in to change notification settings

abdullahi0000/abdullahi-cybersecurity-portfolio

Repository files navigation

Hello, I'm Abdullahi

Professional Statement

I’m Abdullahi Abdinoor Mohamed, a cybersecurity student pursuing a Degree in Information and Cybersecurity. I am currently completing the Google Professional Cybersecurity Certificate and planning to earn CompTIA Security+ and CISSP certifications. I’ve worked on projects like setting up a Network Intrusion Detection System (NIDS) and am eager to take on more challenges. My goal is to become a Security Analyst, where I can leverage my analytical skills, problem-solving abilities, and passion for continuous learning to tackle emerging security threats.

Objective

To leverage my growing expertise in cybersecurity, including hands-on experience with network intrusion detection and industry certifications, to contribute as a Security Analyst. I aim to apply my problem-solving skills, analytical thinking, and dedication to continuous learning in tackling emerging security challenges and ensuring the protection of digital assets.

Portfolio

I have developed this cybersecurity portfolio to showcase my skills and expertise in the field, including those gained from my degree in Information and Cybersecurity and the Google Professional Cybersecurity Certificate. This portfolio is a work in progress and will be continuously updated as I gain more hands-on experience and add new projects, skills and certifications.

Skills

Projects Skills gained
Conducting a Security audit Security Assessment and Risk Analysis, Security Audit Planning, Vulnerability Identification, Compliance and Regulatory Knowledge, Threat Detection and Analysis, Reporting and Documentation
Network Intrusion Detection System (NIDS) Threat Detection and Monitoring, Log Analysis and Correlation, virtualization, Incident Response, Vulnerability Assessment and Exploitation
Linux & SQL Database Querying, Table Management, Data Filtering and Validation, Cybersecurity-Specific SQL Use Cases, Command-Line Proficiency,Bash, Linux System Administration
Log analysis and Incident response Log Analysis and Data Interpretation, Command-Line Proficiency, SIEM

Tools

  • Wireshark
  • Suricata
  • Zeek
  • Tcpdump
  • Splunk
  • Chronicle

Email: abdullahi.mohamed3274@gmail.com

About

Hi! I’m Abdullahi Abdinoor Mohamed, and this is my cybersecurity portfolio. Here, I showcase my hands-on experience, projects, and knowledge in the field of cybersecurity, ethical hacking, and IT security.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published