Aspiring cyber security professional actively looking for a cyber security role. I continue to learn and build my skills in both the GRC and technical areas of cyber security.
Built a cloud-based lab to simulate a live environment for detecting and analyzing unauthorized access.
Configured an Apache2 web server to act as a target system for capturing and logging real-time attack data.
Implemented Firewall rules to manage incoming traffic, secure management ports, and control the exposure of the trap system.
Developed a real-time dashboard to visualize attack info like: source IP Address, Destination Port, and used Commands, for better analysis of attacks patterns.