Hey there, It's Charles!
Programmer
- Automated Vulnerability Management & Reporting Dashboard
- Built My Own SOC
- Basic Home Lab
- Azure Sentinel SIEM
- CompTIA Security+
- CompTIA a+ 1000 Part 1
- Introduction to Cyber Security
- What Is IoT?
- AI and Big Data in IoT
- Introduction to IoT
- Introduction to Cybersecurity
- Conduct a security audit
- Incident Report -Network Traffic Analysis
- Incident Report - Apply OS hardening techniques
- Applu filters to SQL Queries
- File permissions in Linux
- Create Hash values
- Decript an Encrypted message
- Vulnerability assessment report
- PASTA The Process for Attack Simulation and Threat Analysis Worksheet
- Analyze packets using Wireshark
- Capture and filtre packets in Linux
- Incident Report
- Examine alerts, logs, and rules with Suricata
- Using Chronicle's domain search
- Using Splunk Cloud to perform an investigation
β‘ Fun fact: I am currently learning how to play the saxaphone
βπΏ Currenlty working on the Google Cybersecurity Certificate: Course 7: Automate Cybersecurity Tasks with Python