Place for Cybersecurity Projects
I’m passionate about ethical hacking and protecting systems from cyber threats while staying within legal boundaries. With strong problem-solving skills and expertise in network security, penetration testing, and risk assessment, I’m eager to help organizations stay secure. I’m committed to continuous learning and adapting security protocols to meet emerging threats
A Project Introduction: Two to three sentences that state the problem you solved, the data used for the project, and your modeling results.
Modeling and Evaluation: Name and describe the models you used for the project and any corresponding evaluation metrics.
Conclusion: Your recommendations for solving the problem and a description of any future steps you want to take to expand on your project.
Security Audit:
https://docs.google.com/document/d/1NUnLuyHprDoFAelXgACfgn9rutQQR2IzAcDTuEMFd-o/edit?tab=t.0