My Portfolio
Welcome to my portfolio. Here you’ll find a selection of my work. Explore my projects to learn more about some of the knowledge I've gained.
Threat to Information Assurance - Phishing
Paper written on the threat of phishing in an enterprise setting defining its risk, methods of use, and potential mitigations to put in place.
Mandated Requirements - HITECH & HIPPA
Research paper on The Health Information Technology for Economic and Clinical Health Act (HITECH) and its overall reach and effectiveness in addition to The Health Insurance Portability and Accountability Act (HIPPA) as required mandates.
Security Program Implementation Plan
Security program implementation plan for a company's new data center that includes plans for policies and procedures for different security concerns, incident response, and business continuity.
Created in partnership with Tyler Martinez
NMAP Vulnerability Scrip
Bash script written for detecting vulnerabilities while performing a network audit that takes a user input IP address, performs an NMAP vulnerability scan, and displays only the relevant results in the terminal.
Network Design -
Multi-office Company
Network diagram and design reasoning for a company with 50 users in one location, 10 users in another, different departments, and a need for VOIP.
Exploit Research - Log4Shell
Research presentation on the Log4Shell vulnerability exploit going over what it is, how it works, its severity, and mitigation routes.
Research Report -
Law and Ethics
Research report concerning law and ethics about a cyber-crime case from late 2021 that includes both facts as well as personal opinion regarding ethics.
Group Policy Changes
Documented steps taken while creating different group policies within the active directory that included setting minimum password length requirements to a higher character count, setting a password attempt limit and lockout, setting a maximum password age, and assigning them to specific groups in order to automate security administration.
Personal Computer Hardening
List of ten steps taken to harden my personal computer running Windows 10 operating system that includes description of each step along with screenshots.
Network Update -
Local Coffee Shop
Network design update recommendations for a Local Coffee Shop growing out of their current setup that includes a diagram of current and redesigned network along with specific hardware recommendations.