top of page

My Portfolio

Welcome to my portfolio. Here you’ll find a selection of my work. Explore my projects to learn more about some of the knowledge I've gained.

Threat to Information Assurance - Phishing

Paper written on the threat of phishing in an enterprise setting defining its risk, methods of use, and potential mitigations to put in place.

Mandated Requirements - HITECH & HIPPA

Research paper on The Health Information Technology for Economic and Clinical Health Act (HITECH) and its overall reach and effectiveness in addition to The Health Insurance Portability and Accountability Act (HIPPA) as required mandates.

Security Program Implementation Plan

Security program implementation plan for a company's new data center that includes plans for policies and procedures for different security concerns, incident response, and business continuity.

Created in partnership with Tyler Martinez

NMAP Vulnerability Scrip

Bash script written for detecting vulnerabilities while performing a network audit that takes a user input IP address, performs an NMAP vulnerability scan, and displays only the relevant results in the terminal.

Network Design -

Multi-office Company

Network diagram and design reasoning for a company with 50 users in one location, 10 users in another, different departments, and a need for VOIP.

Exploit Research - Log4Shell

Research presentation on the Log4Shell vulnerability exploit going over what it is, how it works, its severity, and mitigation routes.

Research Report -

Law and Ethics

Research report concerning law and ethics about a cyber-crime case from late 2021 that includes both facts as well as personal opinion regarding ethics.

Group Policy Changes

Documented steps taken while creating different group policies within the active directory that included setting minimum password length requirements to a higher character count, setting a password attempt limit and lockout, setting a maximum password age, and assigning them to specific groups in order to automate security administration.

Personal Computer Hardening

List of ten steps taken to harden my personal computer running Windows 10 operating system that includes description of each step along with screenshots.

Network Update - 

Local Coffee Shop

Network design update recommendations for a Local Coffee Shop growing out of their current setup that includes a diagram of current and redesigned network along with specific hardware recommendations.

Send me a message
and I’ll get back to you shortly.

Thanks for submitting!

bottom of page