Detail-oriented, and highly motivated, seeking a position to utilize my skills and abilities in the Computer industry that offers professional growth while being resourceful, innovative and flexible.
Introduction to digital forensics and conducting vulnerability assessments and penetration tests to identify vulnerabilities that malicious hackers could exploit. Certified Ethical Hacker certification exam
Ensure compliance and operational security of an organization's information assets and effectively mitigate risks by implementing security protocols and identifying security threats and vulnerabilities within networks. CompTIA Security + certification exam
Computer and network support, including: install, configure, upgrade, support, troubleshoot, and repair computers and wired and wireless networks. CompTIA A+ and Net+ industry certification exams
During the three Capstone Projects I preformed I used Project management skills, to communicate verbally and in written with my teachers, my ideas. Organizing supplies, and tasks in a list that needed to be preformed, then preforming them while keeping in a time line. While taking the De-Ice disk 1.100 challenge, I preformed reconnaissance techniques to gain information that helped me to find, access, and decrypt a file. The OWASP Broken Web Application virtual machine, I performed at least two attacks for each of the OWASP Top 10 security flaw categories: Injection, Broken Authentication and Session Management, Cross-Site Scripting (XSS), Insecure Direct Object References, Security Misconfiguration, Sensitive Data Exposure, Missing Function Level Access Control, Cross-Site Request Forgery (CSRF), Using Components with Known Vulnerabilities, and Invalidated Redirects and Forwards.
May 2015 - June 2015 The capstone project included 5 CEH Practice quizzes, De-Ice disk 1.100 challenge, and OWASP Broken Web Application virtual machine. After all three steps are completed I will create a report and give a presentation. The CEH Practice quizzes will test knowledge gain in a wide range of competencies while taking the class, and help to prepare for the CEH test. While doing the De-Ice disk 1.100 challenge, I will use reconnaissance techniques to gain information that will help me to find, access, and decrypt a file. The OWASP Broken Web Application virtual machine, I will need to perform at least two attacks for each of the OWASP Top 10 security flaw categories: Injection, Broken Authentication and Session Management, Cross-Site Scripting (XSS), Insecure Direct Object References, Security Misconfiguration, Sensitive Data Exposure, Missing Function Level Access Control, Cross-Site Request Forgery (CSRF), Using Components with Known Vulnerabilities, and Invalidated Redirects and Forwards.
Simulating a cyber-attack on a network. Auditing, monitoring, and analysis of what certain attacks look like from both a defense & offense (blue & red teams) point of view. Using the tools: VMWare Workstation, Windows Server 2008, OSSIM, Zeroshell, Windows 8, Windows XP, Snort, Nessus, and WireShark.
December 2014 The Scope of my capstone project included: upgrading computers, installing operating systems, setting up the Windows 2008 server, making Ethernet cables, and connecting and configuring the: switch, router, firewall, and servers.
|Skills||Experience||Total Years||Last Used|
|Footprinting; Scanning; Analyzer; Spoofing;||Beginner||June 2015|
|Password cracking;||Beginner||June 2015|
Forensics, Network Security, Information Security, Access Control, Authentication, Auditing, Nessus, Snort, Vmware, Windows 8, Windows Server 2008, Windows Xp, Wireshark, Ethernet, Firewall, Router
Resumes, and other information uploaded or provided by the user, are considered User Content governed by our Terms & Conditions. As such, it is not owned by us, and it is the user who retains ownership over such content.
Many factors go into creating a strong resume. Here are a few tweaks that could improve the score of this resume:
Job Titles Held: