Vulnerability Assessment

FOOTPRINTING: Online search. Employee directories, locations,... for social engineering or tech attack Source Code Business/Gov websites with info on management team and financial holding WHOIS tool (assigned IP addresses and…

Fundamental cybersecurity measures

Securing data requires a comprehensive approach to mitigate all possible vulnerabilities. Areas to make sure to cover are: SECURITY POLICIES password policies: require complex passwords and enforce regular password changes…
whoami

whoami

I'm an IT professional and cybersecurity student, working to develop my skills as a cybersecurity professional. I am particularly interested in blue and purple team operations, and would especially like to get into GRC. Not only, I think I would be a great fit, due to my blend of technical knowledge and experience in business!