Updated a file through a Python Algorithm
Conducted a Security Audit
Analyzed Network Attacks
Analysis of Network Hardening
Analyzed Network Layer CommunicationÂ
Applied OS Hardening Techniques
Used the NIST Cybersecurity Framework to Respond to a Security Incident
Used Linux Commands to Manage File Permissions
Applied Filters to SQL Queries
Analyzed a Vulnerable System for a Small Business
Documented Incidents with an Incident Handler's Journal