Hands-on experience in enterprise networking and infrastructure management alongside my mentor, working directly with server racks, patch panels, and structured cabling in a live IT environment. This moment reflects my passion for cybersecurity, networking, and continuous learning through real-world technical experience and mentorship.
My Comprehensive Cybersecurity Strategy Final Project showcases my ability to analyze real-world organizational security challenges and develop layered cybersecurity solutions aligned with industry best practices. Throughout this project, I conducted research on network vulnerabilities, web servers and applications, SQL injection risks, intrusion detection systems (IDS), firewalls, honeypots, database security, and incident response planning.
The project demonstrates my understanding of risk assessment, threat mitigation, security architecture, and defensive cybersecurity strategies within enterprise environments. Using a theoretical and research-based approach, I evaluated potential attack surfaces and proposed practical recommendations focused on strengthening confidentiality, integrity, availability, and overall organizational resilience.
This work reflects both my technical growth in cybersecurity and my passion for protecting critical systems, sensitive data, and healthcare-related infrastructure through proactive security planning and continuous improvement.
The Acceptable Use Policy (AUP) Project focused on developing a professional cybersecurity policy designed to establish guidelines for the safe, ethical, and secure use of organizational technology resources. This project demonstrated my understanding of security governance, user accountability, data protection, password security, internet usage standards, and compliance practices within a professional environment. The policy was designed to help reduce cybersecurity risks by promoting responsible technology usage and protecting sensitive organizational information from misuse, unauthorized access, and security threats.
The Request for Proposal (RFP) Project involved creating a detailed business and technical proposal used to evaluate and select cybersecurity solutions and services for an organization. This project highlighted my ability to analyze organizational security needs, define technical requirements, compare vendor solutions, and recommend technologies aligned with business goals and security objectives. The RFP emphasized critical areas such as network security, system functionality, scalability, compliance, budgeting, and implementation planning, showcasing both my technical and professional communication skills within cybersecurity and IT environments.