Here is a deeper look at what I have done so far!
Raspberry Pi-hole
I was lucky enough to receive the Raspberry Pi as a gift. This immediately opened up a wide door of possibilities. Do I use it to play retro games? Do I set up a small NAS? The possibilities are endless!
Ultimately, I decided to create a Raspberry Pi-hole or a DNS sinkhole. This allowed me to add an extra layer of security to my home network for myself and family members! Who doesn't love extra security?
This gave me hands on experience with networking in the form of DNS and it was my first time working hands on with a version of Linux.
Penetration Testing
This is an ongoing practice of mine. I thoroughly enjoy TryHackMe's platform and I am an avid user. This has given me hands on experience with Linux and various networking protocols. I have learned that critical thinking and problem solving is a very big part of working in IT. Recognizing all the potential vectors of attack whether defending or attacking is crucial. I have recently undertook the SOC Analyst learning path to gain a more in depth knowledge of forensics and securing a network. Encryption has been my favorite topic to learn about in this section! Check out my profile here.
Network+ Journey
Through school I have previously completed two Cisco Networking courses.
I am currently following along with Professor Messer to help study for the CompTIA Network+ exam.
Digital Forensics
Through my studies I have experience with a few different form of digital forensics. I have used Wireshark to capture packets and examine their contents. This gave me a deeper understanding of networking and how data moves across a network. I also have experience with Autopsy which allows you do deep dive into storage devices and files. One of my favorite tools was Exiftool which allows the user to look at hidden data contained within photos.
Programming
I have some experience with Python. It has been one of the most intriguing courses I have taken in my studies. I have created small programs to transfer and sort data or to compute user inputs for various purposes.
Other
I have completed college courses covering a range of essential topics in computer security, including Windows security, Linux security, and fundamental concepts in cybersecurity. These courses have equipped me with a solid understanding of security principles across different operating systems and computing environments.