Certifications

Overview

My learning journey as a Cybersecurity & IT Operations Technician is grounded in hands-on, practical application. This page serves as a comprehensive record of my verified certifications and 90+ hands-on labs, showcasing my proficiency in key areas of security operations, system administration, and network security. Each credential represents a practical exercise and a step toward mastering the skills required to build and defend secure systems. My training and certifications align with industry-recognized frameworks such as the NIST NICE Framework, US Military Occupations (MOS), and the Australian Signals Directorate (ASD) Cyber Skills Framework.—

Featured Certifications & Hands-On Labs

Here is a curated selection of my most impactful, job-relevant credentials and hands-on labs. These projects demonstrate my ability to apply practical skills in real-world security scenarios.

  • Harden a Windows Machine with GPO to Restrict Application Installations
    • Demonstrated applied endpoint hardening by configuring Group Policy Objects to prevent unauthorized software installations.
  • Deploy a GPO to Ensure Credentials Are Entered Securely
    • Implemented access control management by using Group Policy to enforce secure login practices and protect sensitive credentials.
  • Use Cisco Packet Tracer to Create a Dynamic Network for a 1,000-User Organization
    • Applied network architecture and design principles to build a secure enterprise-level network, employing cybersecurity best practices.
  • Use PE Studio To Analyze 5 Files On Your Computer
    • Performed static malware analysis by using PE Studio to examine binary files for suspicious traits, building foundational threat hunting skills.
  • Turn on Windows Firewall and Create a Sample Firewall Rule to Prevent SMB Access
    • Applied network security and endpoint hardening by creating a firewall rule to block SMB traffic, a common vector for lateral movement attacks.
  • Lab Setup: OpenVAS
    • Successfully deployed and configured a containerized vulnerability scanning environment, demonstrating proficiency with an industry-standard security tool.
  • Create a Snapshot of a Virtual Machine to Recover the OS to a Safe State
    • Applied security operations principles to ensure system resilience by creating a snapshot for a secure and repeatable recovery baseline.
  • Use Access Permissions and Rights to Prevent Unauthorized Users from Viewing a Folder
    • Demonstrated data protection and access control management by configuring file system permissions to protect sensitive information.
  • Use Procmon to View, Analyze and Monitor Running Processes on a Windows Machine
    • Applied digital forensics and SecOps skills to monitor and analyze system processes for potential malicious activity.
  • Use the Windows Registry to Restrict the Permissions of Untrusted User Accounts
    • Showcased advanced system administration skills by directly modifying the Windows Registry to enforce granular access controls.

Mossé Cyber Security Institute (MCSI)

MICS – Introduction to Cyber Security

Number of training exercises: 40 Current Progress: 39 out of 39 pts (100%)

Lab Setup

  • Lab Setup: Screen Recording
  • Create a template for a professional document

Professional Writing

  • Use Grammarly to improve the spelling and grammar of your writing
  • Use the Hemingway App to make your writing easier to read
  • Use Quillbot to improve the quality of your writing
  • Use AI to polish your writing and make it more professional

Internet Searching

  • Use Elicit.org to search academic papers
  • Use Bing to find cybersecurity feeds in a specific language
  • Analyze changes to a webpage by comparing its current, cached and archived versions
  • Construct complex Google Search queries to identify publicly available sensitive information
  • Create Google search queries to identify webpages and publicly available documents

Technical Concepts

  • Research the top penetration testing tools
  • Research the Cyber Kill Chain Model and the MITRE Matrix
  • Research the major types of enterprise security software
  • Research the most common network protocols

Open Source Intelligence (OSINT)

  • Create covert social media accounts
  • Create Mindmaps of all data points available on social media platforms and communities

Passive Network Reconnaissance

  • Use dnsdumpster.com to passively map an organization’s external facing assets
  • Use shodan.io to passively map an organization’s external facing assets
  • Search for information leaks on code repositories

Discovering Attack Campaigns

  • Detect typo squatting and phishing with dnstwist.py
  • Use urlscan.io to identify phishing and spear-phishing websites
  • Create Google searches to find open malware sandboxes

Security Tools

  • Use sslscan to assess the SSL configuration settings of HTTPS websites
  • Perform a TCP port scan using Nmap
  • Perform a UDP port scan using Nmap

Threat Hunting using YARA

  • Lab Setup: Threat Hunting with YARA
  • Write a YARA rule that can find itself
  • Write a YARA rule that can find small portable executables
  • Write a YARA rule that is professionally documented
  • Write a YARA rule that searches for files with a given set of strings

Security Lab Setup

  • Lab Setup: Deploy Virtual Machines
  • Lab Setup: Software Development
  • Lab Setup: OpenVAS

Penetration Testing with Tools

  • Perform a vulnerability scan with OpenVAS
  • Use Burp Suite’s Spider to crawl a website
  • Use Burp Suite’s Intruder feature to brute force a login page
  • Perform DNS scans using Fierce

Digital Investigations

  • Use Dumpzilla to extract forensics browser logs
  • Use PE Studio to analyze 5 files on your computer

MSAF – System Administration Fundamentals

Number of Training Exercises: 106 Current Progress: 22/84.5 pts (26%)

Practical Scenarios

These modules are comprised of multi-step projects that simulate real-world IT and cybersecurity tasks in a live enterprise environment.

Windows Server 101

  • Description: This scenario involves building a complete Windows enterprise environment from scratch, including a Domain Controller, file server, and web server.
  • Key Skills Demonstrated: Enterprise System Administration, Active Directory Management, GPO Deployment, Network Infrastructure Services.
  • Tasks:
    • Setup a Domain Controller in a cloud ICT environment
    • Install a Squid proxy and force all Internet traffic through it
    • Create and link a GPO to a Domain Controller
    • Create an Active Directory Forest
    • Setup a file server and connect it to a domain
    • Setup a Windows Exchange Server and expose relevant network services
    • Setup a machine that will simulate a Windows workstation and connect it to the domain
    • Setup a machine that will simulate a Print Server and connect it to the domain
    • Set user permissions to allow/deny access to File Shares
    • Deploy and configure an IIS webserver
    • Create and configure 4 different subnets for the AD environment
    • Deploy a GPO that applies security best practices across the fleet of computers

Introduction to Exchange Server Administration

  • Description: This scenario focuses on the installation, configuration, and security of an Exchange server, including digital forensics and SIEM integration.
  • Key Skills Demonstrated: Mail Server Administration, Digital Forensics, SIEM Integration, Email Security.
  • Tasks:
    • Install and configure an Exchange server and connect it to a domain
    • Create 10 exchange mailbox accounts
    • Research and explain Exchange server audit logs for digital forensics
    • Enable Administration Audit logs on your exchange server
    • Delegate a mailbox from one user to another
    • Setup mail forwarding from one mailbox to another
    • Create an Email distribution group
    • Create an Email security group
    • Run a mail trace on a user’s mailbox
    • Install and configure AlienVault OSSIM (SIEM)

Completed Modules

  • Virtualization Fundamentals (9/9)
  • Networking Fundamentals (4/4)
  • Windows System Security and Administration – Part 1 (7/7)
  • Windows System Security and Administration – Part 2 (4/9)
  • Windows System Security and Administration – Part 3 (0/8)
  • Firewall Fundamentals (0/6)
  • System Security and Administration: Linux (0/5)
  • Backups and Recovery and Restoration 101 (0/9)
  • Introduction to Troubleshooting (0/4)
  • Linux Server 101 – General (0/9)
  • Linux Server 101 – Networking (0/5)
  • Linux Server 101 – Hardening (0/8)
  • Procedures (0/1)

View Career Development Milestones


Additional Certifications

  • ISC2 Certified in Cybersecurity (CC): This globally-recognized certification validates my foundational knowledge in key cybersecurity domains, including security principles, business continuity, and risk management.
  • KCCS - Knowledge of Cybersecurity Skills: This certification affirms my theoretical knowledge of essential cybersecurity concepts, including network security, threat analysis, and incident response, providing a strong foundation for professional development.
  • KCIS - Knowledge of Core IT Skills: This certification validates my understanding of fundamental IT principles, encompassing hardware, software, networking, and troubleshooting, serving as a solid stepping stone for further technical learning.
  • Google Cybersecurity: Completed exercises and hands-on labs in cybersecurity fundamentals, threat detection, and IT operations.
  • Google IT Support: Completed practical labs in system administration, troubleshooting, and IT infrastructure management.
  • Windows Server Management and Security: Implemented exercises in server configuration, Active Directory, and Windows security hardening.
  • Automate Cybersecurity Tasks with Python: Implemented scripting exercises to automate security monitoring and remediation tasks.
  • Tools of the Trade: Linux and SQL: Hands-on exercises in Linux administration and SQL-based data management.
  • Foundations of Cybersecurity: Practical exercises covering cybersecurity fundamentals, threat modeling, and mitigation strategies.
  • Detection and Response: Applied exercises in threat detection, incident response, and logging analysis.
  • Security Risk Management: Exercises in identifying assets, threats, vulnerabilities, and implementing mitigation controls.
  • Connect and Protect: Networks and Network Security: Completed labs on network defense, monitoring, and security controls implementation.
  • Decentralized Finance (DeFi) Deep Dive & Infrastructure: Practical exercises exploring blockchain infrastructure, smart contracts, and risk management.
  • Decentralized Finance (DeFi): The Future of Finance: Completed practical exercises in DeFi protocols, blockchain infrastructure, and risk assessment.
  • Cybersecurity Risk Management Framework: Applied concepts of enterprise cybersecurity governance, risk management, and compliance frameworks.
  • Kali Linux: Hands-on exercises with penetration testing, vulnerability scanning, and network security assessment.
  • NIST 800-171 & DoD RMF: Applied cybersecurity standards for federal systems and implemented risk management exercises.
  • Technical Support Fundamentals & System Administration: Completed exercises in IT support, infrastructure services, and system administration best practices.