OWASP Web Vulnerability Report
- Worked with team to create a report on different web vulnerabilities
- Used JuiceWorld to identify broken access control problems on the website Analyzed web script on JuiceWorld to demonstrate possible ways to hack the site
Database Website Application
- Built a website that connected to mySQL to display databases
- Designed the site to be interactive by combining python/HTML/CSS/Javascript with the SQL database to perform SQL queries and actions Added security features to separate clients and staff by implementing role based authorization in the login page
Networking Configuration of new LAN and WAN infrastructure
- Configured switches and routers based on topology given Used protocols such as VLANS, Trunk, NHRP, FHR, MPLS, DMVPN, EtherChannel, IPSec, Spanning tree, path manipulation and EIGRP to enable packets to be able to reach their destinations
- Documented the process, steps taken and recommended security features to enhance the network security