Developing skills in strengthening systems and reducing exposure to cyber risks.
Gaining hands-on experience in ethical hacking and vulnerability discovery.
Building knowledge in detecting, analysing, and responding to security incidents.
Set up a cloud-based vulnerable machine with firewall rules to simulate attacks, analyse logs in real-time, and visualise global hacking attempts using an IP geolocation world map.
Developed a Bash-based Nmap automation tool to streamline network reconnaissance, featuring customisable scan profiles, efficient service detection, and automated output logging for penetration testing workflows.
Conducted a simulated penetration test, documenting vulnerabilities, exploitation steps, and remediation strategies with a detailed technical appendix for deeper insight.
Designed and configured a secure enterprise-level network in Cisco Packet Tracer, implementing VLAN segmentation, ACLs, and redundancy to simulate real-world network hardening