Skip to main content

SOFTWARE/HARDWARE SKILLS

 

Source: https://th.bing.com/th/id/R.fb97e047a365e1b5b5e67239714e5d18?rik=pcqpDcFeKqE%2bLw&pid=ImgRaw&r=0

Hello, in this post I will be sharing my current IT skills and experiences.


My interest in computing started at an early age and I was fortunate to have a laptop at home when I was just six years old. I quickly became familiar with Microsoft Word and Excel, and even experimented with PowerPoint, although at that time, computer-based presentations were not widely used in my country.


When I was 13, I watched some tutorials on YouTube on how to hack Wi-Fi passwords and managed to obtain my school's Wi-Fi password and iPad restriction code. Unfortunately, this resulted in a controversial situation where I was recognized for my technical abilities but also punished for being unethical and causing the school financial loss.


At 14, I started learning JavaScript and Python but had to focus on my high school final exams and didn't work on many projects. By the time I was 17, I created my first website using HTML, CSS, and JavaScript. I also got a domain name and hosted the website. I am proficient in HTML, CSS, JavaScript, and Python, and have worked with frameworks like ReactJS, NodeJS, and Django. I have some knowledge of databases, including MySQL and MongoDB.


In 2022, I focused more on cybersecurity and networking, using software such as Kali Linux, Cisco Packet Tracer, and Microsoft Azure, among others. Although I have not used any specific cybersecurity hardware, I am aware that we will be using hardware such as Raspberry Pi and dongles during our penetration testing module. We will also be working with software like Linux, Ubuntu, Wireshark, Azure, Kubernetes, and more.


These tools will be particularly helpful in our cybersecurity activities, as many tasks are performed on the command line, and Linux is a preferred platform for this purpose. Additionally, Azure will be useful in our secure coding sessions, as it will provide hands-on experience with secure coding and vulnerability libraries.

Comments

Popular posts from this blog

Case Study - Method

Source: https://www.google.co.uk/url?sa=i&url=https%3A%2F%2Fwww.facebook.com%2Fmethoduk%2F&psig=AOvVaw1TjPOsSrMz-Vs9czJ_mxRc&ust=1685998095949000&source=images&cd=vfe&ved=0CBAQjRxqFwoTCJCq48K-qv8CFQAAAAAdAAAAABAj Method The methodology employed in the case study described in the book "Cyber Security: Case Study" reflects a systematic and meticulous approach to ethical hacking. This section outlines the key steps and processes undertaken by the ethical hacking team to assess the organization's cybersecurity measures. The first step in the methodology involved the selection of a qualified and experienced ethical hacking team. The team's expertise in various aspects of cybersecurity, such as network security, web application security, and social engineering, ensured a comprehensive assessment across different attack vectors. Careful consideration was given to the team's certifications, qualifications, and track record of successful engagements...

Initial Project Plan(Gantt Chart Update)

 BEFORE CONTINOUS ASSESSMENT AFTER CONTINOUS ASSESSMENT I used the Gantt chart above to plan and monitor all the blogs I had to write for this module. It was a rewarding experience to explore these topics and share my insights with you. The chart also helped me stay focused and motivated by showing me my progress and achievements. REFERENCE https://online.officetimeline.com/app/#/file/5cacb847-5749-4e92-9d55-25480acdc8b4/gantt-view [Accessed Date: 4th June 2023]

ESSAY (MAIN BODY)

Hi, in this blog I would be showing you my essay's main body. The body talks more about AI in endpoint security and its functionalities/application in endpoint security. It also touches on the benefits of AI in endpoint security.