Skip to content
View orisex's full-sized avatar

Block or report orisex

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
orisex/README.md

👋 Hi, I’m Manuel Welcome to my GitHub! I'm currently taking an Intro to Cyber Security course at Harvard Online and just getting started in the world of tech.

🌱 What I’m learning Cybersecurity fundamentals Basic tools and concepts like GitHub, encryption, and hashing How to stay safe and protect data online

🎯 My Goals Learn the foundations of cybersecurity Get more comfortable using GitHub and other tools Build confidence step by step

📌 This is just the beginning Right now, I’m exploring and learning. One day at a time. Thanks for stopping by!

Pinned Loading

  1. internal-security-audit-botium-toys internal-security-audit-botium-toys Public

    Cybersecurity portfolio project: internal security audit simulation using NIST CSF

  2. cybersecurity-portfolio cybersecurity-portfolio Public

    A growing cybersecurity portfolio showcasing Linux, file permissions, security audits, and hands on labs.

  3. Incident-Report-DDoS-Attack-on-Internal-Network-NIST-Framework-Analysis- Incident-Report-DDoS-Attack-on-Internal-Network-NIST-Framework-Analysis- Public

    This report analyzes a simulated DDoS (Distributed Denial of Service) attack on a company’s network using the NIST Cybersecurity Framework. It includes steps taken to identify the threat, protect s…

  4. linux-file-permissions-portfolio linux-file-permissions-portfolio Public

    A hands-on demonstration of managing file permissions in Linux using chmod and ls commands.

  5. Cybersecurity-SQL-Investigations-Portfolio Cybersecurity-SQL-Investigations-Portfolio Public

    SQL queries for investigating cybersecurity login events and employee data.

  6. vulnerability-assessment-report vulnerability-assessment-report Public

    Example vulnerability assessment for a small business e-commerce database system, demonstrating risk analysis and remediation planning.