Click Flip to view details. Links from home will scroll to the selected card.
Designed a secure LAN architecture with VLAN segmentation, DHCP services, and Layer 3 inter-VLAN routing.
Designed HQ and branch networks with VLANs, DHCP, and static routing across multiple segments.
Hardened Linux systems through secure user/group management and permission enforcement.
Reduced attack surface and tuned system services to improve security and performance.
Metrics collection + dashboards + alert rules, plus brute-force blocking with simulated scenarios.
Studied execution flow, evasion concepts, sandbox awareness and detection limitations (controlled env).
Manual + automated testing: XSS, SQLi, authentication bypass, and session issues.
Benchmarked algorithms (symmetric, asymmetric, hashing) under consistent conditions.
Stakeholders, systemic risk, and threat analysis for a major cybersecurity incident.
Analyzed vulnerabilities, impact, and response strategies in a healthcare breach.
Compliance requirements, governance frameworks, policy alignment, and accountability mapping.
Algorithms, memory handling, and efficient I/O applications.
Full-stack web app with authentication and database integration.
Text-based RPG with resource management and combat mechanics.
Privacy, surveillance, and digital rights challenges with balanced solutions.