Skip to content

My Google Cybersecurity portfolio, featuring practical projects and write-ups that demonstrate my understanding of common vulnerabilities, security tools, and defensive strategies.

Notifications You must be signed in to change notification settings

OGMasterShabaRanks/Google-Cybersecurity-Portfolio

Repository files navigation

Zipho Mashaba | Google Certified Cybersecurity Professional

Aspiring Cybersecurity Analyst (Security Analyst), passionate about defending digital assets and building resilient systems. I am passionate about technology, code and pushing myself to levels I haven’t achieved before, even if it may be difficult at times.

About Me

I am an analytical, solution orientated thinker (that deals in solutions, not probleams) with a fascination for understanding how things work. I have a high value for ethics as well as the ability to constantly learn & excersise that knowledge. What draws me to Cybersecurity is both the ‘Sword & Shield’ aspects respectfully. From the Sword aspect of it I get to ethically test my skills & knowledge through retriving sensitive information to asssit the company in it's endeavours, while on the other hand I also get to be apart of the Shield aspect of it where I would be protecting the company from all threats both internal & external.

Key Skills

  • Security Concepts: Threat & Risk Analysis, Vulnerability Management, Incident Response, NIST Cybersecurity Framework, MITRE ATT&CK Framework, CIA Triad
  • Tools & Platforms: Linux, Wireshark, SIEM (e.g., Splunk/Chronicle), SQL, Git/GitHub
  • Scripting & Automation: Python (for log analysis, automation)
  • Networking: TCP/IP, Network Protocols, Network Hardening
  • Soft Skills: Problem Solving, Critical Thinking, Technical Communication, Documentation

Portfolio Projects

This section showcases my hands-on projects, which align with the curriculum of the Google Cybersecurity Professional Certificate. Each project is designed to demonstrate practical skills and a methodical approach to solving security challenges.

Project Title Course Reference Key Skills Demonstrated
Botium Toys Security Audit Course 2: Play It Safe: Manage Security Risks Risk Management, Threat Identification, NIST Framework
Network Traffic Analysis & Hardening Course 3: Connect and Protect: Networks and Network Security Wireshark, Packet Analysis, Network Security
Linux & SQL Security Analysis Course 4: Tools of the Trade: Linux and SQL Linux Command Line, SQL Queries, Log Analysis
Vulnerability Management & Remediation Plan Course 5: Assets, Threats, and Vulnerabilities Vulnerability Management, Threat Modeling, MITRE ATT&CK Framework
Incident Response Playbook for Ransomware Course 6: Sound the Alarm: Detection and Response Incident Response Lifecycle, Containment, Post-Incident Analysis
Automated Log Parser with Python Course 7: Automate Cybersecurity Tasks with Python Python Scripting, Automation, File I/O, Parsing

Certifications & Links

About

My Google Cybersecurity portfolio, featuring practical projects and write-ups that demonstrate my understanding of common vulnerabilities, security tools, and defensive strategies.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages