A curated collection of cybersecurity projects developed in partial fulfillment of the Google Cybersecurity Professional Certificate. This portfolio demonstrates practical skills in threat analysis, vulnerability assessment, network security, and incident response using Python, Linux, SQL, and open-source tools. Projects reflect hands-on labs and real-world scenarios aligned with industry best practices for entry-level security roles.
Google Cybersecurity Professional Course Overview
- Personal Statement
- Botium Toys Security Audit
- Incident Report Analysis
- Examine and Manage File and Directory Permissions in Linux
- Apply Filters to SQL Queries
- Home Office Asset Inventory
- Risk Register
- Data Handling Control
- Decrypting Encrypted Files in Linux
- Generate Hashes for Files
- Access Control Assessment
- Hardware Vulnerability Assessment
- USB Drive Attack Vectors
- PASTA Threat Model
- Incident Handler's Journal
- Foundations of Cybersecurity
- Play It Safe: Manage Security Risks
- Connect and Protect: Networks and Network Security
- Tools of the Trade: Linux and SQL
- Assets, Threats, and Vulnerabilities
- Sound the Alarm: Detection and Response - In Progress
- Automate Cybersecurity Tasks with Python - Not Yet Started
- Put It to Work: Prepare for Cybersecurity Jobs - Not Yet Started