Portfolio
Welcome to my portfolio! Here, you'll find all the projects I've worked on during my time as a student at UAT. Throughout my journey, I have focused on various projects and acquired a wide range of skills in network security. In addition to my core coursework, I've also had the opportunity to develop additional skills in areas such as 3D modeling, the fundamentals of robotics, and much more. I invite you to explore my story and the work I've created. Enjoy!

Firewall Software Appliance Management
The Firewall Software and Appliance Management Project focused on configuring and testing the Sophos Firewall, a security appliance used for network protection, content filtering, and traffic management. The project involved reviewing existing firewall rules, including DMZ and outbound traffic policies, as well as creating custom security policies to restrict access to websites like Netflix and YouTube during work hours. By utilizing Sophos’ Server Access Assistant (DNAT), the project demonstrated how to create and enforce rules for network security.

Daubert & Frye - Legal Implementation Plan
This report explores the Daubert and Frye standards, which determine whether expert forensic testimony is admissible in court. It explains how the Daubert standard emphasizes scientific validity and is now the dominant legal framework. The report also covers how digital forensic investigators must comply with legal regulations, including the Computer Fraud and Abuse Act (CFAA), the Fourth Amendment, and the General Data Protection Regulation (GDPR). Additionally, it introduces best practices for forensic investigations, such as chain of custody, verified forensic tools, and proper data handling to ensure evidence is legally admissible.

Battle of Attrition
Battle of Attrition is a competitive 1v1 strategy game that challenges players to outlast their opponent through calculated unit deployment and resource management. Set along a linear battlefield path, players summon units and engage in tactical skirmishes with the goal of overwhelming the enemy’s defenses while managing limited resources. Victory is not achieved quickly, but through endurance and attrition — every move counts as players slowly grind down their opponent’s forces over time.

AWS - Security Group - Automation Script
In this project, I automated the configuration of firewall rules for AWS EC2 instances using the AWS Command Line Interface (CLI). The process involved scripting the creation of a Security Group, which included adding inbound rules to allow HTTP (port 80) and HTTPS (port 443) connections from any IP address. Additionally, I restricted SSH (port 22) access to a specific IP address. By automating these steps, I ensured consistent application of security policies across cloud instances while minimizing manual configuration errors.

Project 6 - CRF - Pickle Rick
The NTS 330 Final Project is a hands-on penetration testing exercise using a Capture The Flag (CTF) challenge to exploit security vulnerabilities in a controlled environment. It involved network reconnaissance, privilege escalation, command execution, and directory brute-forcing. The report illustrates how attackers exploit system weaknesses and outlines mitigation techniques like secure authentication, intrusion detection systems (IDS), logging, and role-based access control (RBAC).

Busterblock Inc. Network Consultant Project
The BusterBlock Inc. Network Consultant Project aimed to improve the physical security of a small call center by addressing vulnerabilities like unauthorized access and equipment theft. It included a risk assessment, security policy recommendations, and an updated network diagram with cameras and badge-based access control

Disaster Recovery Plan - Shoe Inc.
For my Disaster Recovery Plan project, I developed a tailored policy for a cloud-based business using AWS services. It includes risk assessments, a business impact analysis, recovery objectives, and strategies like AWS Backup, cross-region replication, IAM access control, and regular testing.