Cyber Security is applicable everywhere.

Exploring governance, regulations, and compliance in the evolving field of cyber security and risk management.

As artificial intelligence (AI) technologies become increasingly integrated into our daily lives, understanding AI vulnerabilities is crucial for safeguarding personal information and privacy. These vulnerabilities can manifest in various forms, including data breaches, algorithmic biases, and manipulation of AI systems. To protect yourself, it's essential to adopt strong online security practices, such as using complex passwords, enabling two-factor authentication, and regularly updating software to patch known vulnerabilities. Additionally, be cautious about the information you share online and regularly review privacy settings on social media and other platforms. Educating yourself about AI's capabilities and limitations can further empower you to make informed decisions. By remaining vigilant and proactive, you can mitigate the risks associated with AI technologies and enhance your personal security in an increasingly digital world.

SIEM Projects #1

Security information and event management, SIEM for short, is a solution that helps organizations detect, analyze, and respond to security threats before they harm business operations. I have had fun exploring different Open-source and Free Trial product to better help my hands on experience.

Let's Defend Challenge Project 1
a man riding a skateboard down a street next to tall buildings
a man riding a skateboard down a street next to tall buildings
black blue and yellow textile
black blue and yellow textile
photo of white staircase
photo of white staircase
Let's Defend Splunk Project

This project aims to develop a user-friendly mobile application.

black blue and yellow textile
black blue and yellow textile

BurpSuite and NMAP Projects

Provide a short summary of your recent projects, highlighting the most important things.

a man riding a skateboard down the side of a ramp
a man riding a skateboard down the side of a ramp
BurpSuite Project
  • HTTP(s) / WebSockets proxy and history.

  • Essential tools - Repeater, Decoder, Sequencer, and Comparer.

black blue and yellow textile
black blue and yellow textile
NMAP Vulnerability Scanning Project of GeeksforGeeks.com and OWASP Juice Shop

Nmap is used to discover hosts and services on a computer network by sending packets and analyzing the responses. Nmap provides a number of features for probing computer networks, including host discovery and service and operating system detection. While using a secure Oracle Virtual Machine with Kali Linux installed. Making sure all default username, password, updates and upgrades were performed and configured with no SSH Access, activated UFW firewall, WHOAMI uploaded from GitHub, and ProxyChains. I performed an vulnerability scan of www.geeksforgeeks.org and www.owaspjuiceshop.com with the command nmap -v , and nmap -sT for a verbose and stealth SYN scan which found Ports 80/tcp open http, and 443/tcp open https both on IP 108.138.246.101. I enjoyed and learn much about open and unsecured ports.

Logical SIEM Diagram Setup #1

Provide a short summary of your recent projects, highlighting the most important things.

MicroSoft Azure Sentinel SIEM and Threat Intelligence Project

Provide a short summary of your recent projects, highlighting the most important things.

1st SIEM attempt in Azure VM

This my 1st attempt at setting up a SIEM in real time in Azure and through Sentinel. Generating logs and monitoring successful brute-force attacks and Port RDP 3389. I think it went okay.

mysql Project #1

photo of white staircase
photo of white staircase
Project title

This project aims to develop a user-friendly mobile application.

MySQL Workbench is a unified visual tool for database architects, developers, and DBAs. MySQL Workbench provides data modeling, SQL development, and comprehensive administration tools for server configuration, user administration, backup, and much more.