Projects (Flashcards)

Click Flip to view details. Links from home will scroll to the selected card.

Networking • LANVLANs • DHCP

Secure and Scalable LAN Design — MetroHealth Hospital

Designed a secure LAN architecture with VLAN segmentation, DHCP services, and Layer 3 inter-VLAN routing.

Flip
Tip: Click Flip again to return.
SecurityTools
  • Security: mitigated VLAN hopping, DHCP spoofing, ARP poisoning; documented redundancy/HA.
  • Tools: Cisco Packet Tracer, VLANs, DHCP, Routing, Network Security.
Flip back
RoutingIPv4/IPv6

Emerald Retail Networking Project

Designed HQ and branch networks with VLANs, DHCP, and static routing across multiple segments.

Flip
  • Security: WPA3 wireless, MAC filtering, Layer 2 protections, SSH admin access.
  • Tools: Cisco Packet Tracer, IPv4/IPv6, Wireless Security.
Flip back
LinuxBash

Linux Security & Automation Project

Hardened Linux systems through secure user/group management and permission enforcement.

Flip
  • Automation: firewall rules, automated updates, log monitoring using Bash scripts.
  • Tools: Linux, Bash, iptables/ufw.
Flip back
HardeningPerformance

System Hardening & Performance Optimization

Reduced attack surface and tuned system services to improve security and performance.

Flip
  • Security & Performance: disabled unnecessary services, enforced least privilege, validated metrics.
  • Tools: Linux, Bash, systemctl, permissions management.
Flip back
MonitoringBlue Team

Prometheus, Grafana & Fail2ban Security Monitoring

Metrics collection + dashboards + alert rules, plus brute-force blocking with simulated scenarios.

Flip
  • Observability: custom alert rules + real-time dashboards.
  • Tools: Prometheus, Grafana, Fail2ban, Ubuntu.
Flip back
Malware ConceptsDefensive

Fake Malware & Evasion Techniques (Simulated)

Studied execution flow, evasion concepts, sandbox awareness and detection limitations (controlled env).

Flip
  • Skills: Malware analysis concepts, behavioral analysis, defensive awareness.
Flip back
Web SecurityOWASP

Web Application Penetration Testing

Manual + automated testing: XSS, SQLi, authentication bypass, and session issues.

Flip
  • Tools: OWASP ZAP, PHP, HTML/JavaScript, Browser DevTools.
Flip back
CryptoPython

Cryptography Benchmarking

Benchmarked algorithms (symmetric, asymmetric, hashing) under consistent conditions.

Flip
  • Tools: Python, cryptography libraries, performance analysis.
Flip back
Case StudyRisk

UST Treasury Cyber Breach — Janet Yellen (Case Study)

Stakeholders, systemic risk, and threat analysis for a major cybersecurity incident.

Flip
  • Skills: Threat analysis, cybercrime research, risk assessment.
Flip back
IncidentHealthcare

Optum Cybersecurity Incident Project

Analyzed vulnerabilities, impact, and response strategies in a healthcare breach.

Flip
  • Skills: Incident analysis, impact assessment, security recommendations.
Flip back
GRCCompliance

Compliance, Governance & Regulatory Analysis

Compliance requirements, governance frameworks, policy alignment, and accountability mapping.

Flip
  • Focus: risk management, regulatory obligations, stakeholder accountability.
  • Skills: GRC, compliance analysis, risk assessment.
Flip back
ProgrammingC/C++

C / C++ Programming Project

Algorithms, memory handling, and efficient I/O applications.

Flip
  • Tools: C, C++, GCC, Linux.
Flip back
Full-StackWeb

Dynamic Web Application Development

Full-stack web app with authentication and database integration.

Flip
  • Tools: HTML, CSS, JavaScript, PHP, MySQL, Java.
Flip back
AssemblyEasy68K

Assembly — Game of Tiny Thrones

Text-based RPG with resource management and combat mechanics.

Flip
  • Tools: Assembly (Easy68K).
Flip back
ResearchEthics

Cybersecurity Ethics Research

Privacy, surveillance, and digital rights challenges with balanced solutions.

Flip
  • Skills: Cybersecurity ethics, critical thinking, research.
Flip back