top of page

Portfolio

Welcome to my portfolio! Here, you'll find all the projects I've worked on during my time as a student at UAT. Throughout my journey, I have focused on various projects and acquired a wide range of skills in network security. In addition to my core coursework, I've also had the opportunity to develop additional skills in areas such as 3D modeling, the fundamentals of robotics, and much more. I invite you to explore my story and the work I've created. Enjoy!

Complex Weapon Design - MP7

In this final project, I need to create another complex weapon designed as this will help me understand and apply edge modeling workflows

Texturing Models - Barrel & Chest

This project has me creating 2 prop models and demostrate unwrapping and texturing pipelines. They idea is to model a simple object and texture it.

Modular Modeling - Walls and Floors

Now this assignment has me creating an enclosed room that demonstrates hard surfaces modeling techniques and modular construction.

Primitive Modeling - Robot

The goal with this assignment was to create a 3D robot model only utilizing primitive stacking techniques that introduce standard primitives.

Firewall Software Appliance Management

The Firewall Software and Appliance Management Project focused on configuring and testing the Sophos Firewall, a security appliance used for network protection, content filtering, and traffic management. The project involved reviewing existing firewall rules, including DMZ and outbound traffic policies, as well as creating custom security policies to restrict access to websites like Netflix and YouTube during work hours. By utilizing Sophos’ Server Access Assistant (DNAT), the project demonstrated how to create and enforce rules for network security.

Daubert & Frye - Legal Implementation Plan

This report explores the Daubert and Frye standards, which determine whether expert forensic testimony is admissible in court. It explains how the Daubert standard emphasizes scientific validity and is now the dominant legal framework. The report also covers how digital forensic investigators must comply with legal regulations, including the Computer Fraud and Abuse Act (CFAA), the Fourth Amendment, and the General Data Protection Regulation (GDPR). Additionally, it introduces best practices for forensic investigations, such as chain of custody, verified forensic tools, and proper data handling to ensure evidence is legally admissible.

Cameras, Lighting and Rendering

The goal of this project is create common camera shots with a character of our choice. There are 12 camera angles I need to demonstrate. I will need to use lighting and focusing on many different rules when creating these angles.

3D Animation - Character Waking

In this project, I need to use the a 3D character of my choice to create a custom animation of my choice. The limits were having a minimum of 240 frames.

Character Modeling - Character

For this project we needed to create a 3D simplified character model that pushes on organic modeling techniques.

Battle of Attrition

Battle of Attrition is a competitive 1v1 strategy game that challenges players to outlast their opponent through calculated unit deployment and resource management. Set along a linear battlefield path, players summon units and engage in tactical skirmishes with the goal of overwhelming the enemy’s defenses while managing limited resources. Victory is not achieved quickly, but through endurance and attrition — every move counts as players slowly grind down their opponent’s forces over time.

AWS - Security Group - Automation Script

In this project, I automated the configuration of firewall rules for AWS EC2 instances using the AWS Command Line Interface (CLI). The process involved scripting the creation of a Security Group, which included adding inbound rules to allow HTTP (port 80) and HTTPS (port 443) connections from any IP address. Additionally, I restricted SSH (port 22) access to a specific IP address. By automating these steps, I ensured consistent application of security policies across cloud instances while minimizing manual configuration errors.

Project 6 - CRF - Pickle Rick

The NTS 330 Final Project is a hands-on penetration testing exercise using a Capture The Flag (CTF) challenge to exploit security vulnerabilities in a controlled environment. It involved network reconnaissance, privilege escalation, command execution, and directory brute-forcing. The report illustrates how attackers exploit system weaknesses and outlines mitigation techniques like secure authentication, intrusion detection systems (IDS), logging, and role-based access control (RBAC).

Character Rigging

Now this project has me using a previous character model that I created and now I need to demonstrate 3D rigging pipelines that includes a skeletal system.

3D Animation - Bouncing Ball

This assignment is the introduction to animation and has me following the 12 principles of animation. The idea is to have a ball bounce at least 6 times.

Complex Modeling - Tool & Gun

In this assignment we are to create a hammer and choose one additional tool or weapon to create including the hammer. The idea is to demonstrate the modeling complexity using selection tools like Editable Ploy Mode in 3Ds Max.

Busterblock Inc. Network Consultant Project

The BusterBlock Inc. Network Consultant Project aimed to improve the physical security of a small call center by addressing vulnerabilities like unauthorized access and equipment theft. It included a risk assessment, security policy recommendations, and an updated network diagram with cameras and badge-based access control

Disaster Recovery Plan - Shoe Inc.

For my Disaster Recovery Plan project, I developed a tailored policy for a cloud-based business using AWS services. It includes risk assessments, a business impact analysis, recovery objectives, and strategies like AWS Backup, cross-region replication, IAM access control, and regular testing.

© 2024 created by Nickolaus Grant. Powered and secured by Wix

bottom of page