top of page
Google-Cybersecurity-Image_edited.jpg

Google Projects

Python

Learn basic Python code: conditional statements, iterative statements, functions, and algorithms.

This project links to an algorithm I created in my course.

Structured Query Language (SQL)

By using SQL filtering I checked company logs to investigate a potential security risk involving login attempts. I also located all devices needing software updates. Both of these tasks increase the cybersecurity of my organization and therefore the security of their data. 

Internal Audit

Complete internal audit report for fictional company "Botium Toys". Report includes audit scope, goals, and risk assessment.

Log Analysis (Wireshark)

Use Wireshark for log analysis to discover a DoS attack. 

Coming soon

Intrusion Detection System (IDS)

Practical experience in running Suricata to

  • create custom rules and run them in Suricata,

  • monitor traffic captured in a packet capture file, and

  • examine the fast.log and eve.json output.

Coming soon

Linux

Implement the Least Privilege Model with user authorization and access management in Linux shell Bash. I did this by adding and removing permissions for users on files and directories in Bash.

Ticketing System

Practice using ticketing system to investigate and escalate a ticket involving a phishing email. I used a playbook for each step in my response. I practiced using  "VirusTotal" to confirm the email contained a malicious attachment. 

SIEM tools (Splunk)

Use Splunk to query SIEM database and investigate failed login attempts for root user account on secure mail server.

Network Analysis (tcpdump)

Use tcpdump for network traffic analysis to investigate a website that is not loading. 

Coming soon
bottom of page