Encryption with GPG (CS695 Lab 3)
Symmetric and asymmetric encryption using GPG in Kali Linux (AES/TWOFISH, key generation, signing, compression behavior).
I’m a cybersecurity professional with an M.S. in Computer Information Systems (Security) from Boston University.
This portfolio highlights hands-on security work in encryption, password auditing, MITM testing, browser security hardening, and cloud IAM security foundations.
View ResumeSymmetric and asymmetric encryption using GPG in Kali Linux (AES/TWOFISH, key generation, signing, compression behavior).
Online/offline password cracking using Hydra and John the Ripper with mitigation discussion.
Firefox privacy/security settings, cookies & tracking inspection, extensions, and TLS/certificate checks.
ARP poisoning + MITM experiments with Wireshark capture and Telnet/Netcat manipulation.
AWS account hardening and IAM tasks (MFA, CloudTrail logging, encryption keys, permission boundaries).
SQL/database design project for tracking social connections, users, and account types.
Generative-AI concept for recommending books for students; includes agile artifacts and delivery planning.
SDLC comparison (Waterfall/RAD/Agile) with roadmap and risk analysis.
Strategy presentation covering market expansion, analysis, and subscription optimization.
Healthcare cybersecurity case study identifying top risks to ePHI and applying enterprise risk strategies.
Completion certificate for OnDemand Security+ SY0-701 curriculum.
AmeriCorps State and National service certification letter for Jumpstart for Young Children, Inc.
Interested in connecting? Email me: