Summary
Overview
Education
Timeline
Certification
Courses Completed | Grade Achieved

Shamair Ahmed

Oakville,ON

Summary

Aspiring cybersecurity enthusiast, proficient in fundamental cybersecurity principles. Driven by a strong commitment to safeguarding digital assets and proactively managing risks. Demonstrates effective communication skills and a dedicated approach to collaborative teamwork. Eager to contribute significantly to cybersecurity initiatives, aiming to excel within dynamic and diverse team environments.

Committed to continuous growth and career advancement, seeking to further develop and refine cybersecurity skills during a hiatus from university. With a passion for staying updated on emerging trends and technologies in the field, dedicated to contributing valuable insights and expertise to the cybersecurity landscape, ensuring robust protection for digital assets.

Overview

1
1
Certification
8
8
years of post-secondary education

Education

HBSc - Psychology

University of Toronto, Toronto, ON
09.2019 - Current

High School Diploma -

Garth Webb Secondary School, Oakville, ON
09.2015 - 05.2019

Timeline

Google Cybersecurity by Google on Coursera

09-2023
University of Toronto - HBSc, Psychology
09.2019 - Current
Garth Webb Secondary School - High School Diploma,
09.2015 - 05.2019

Certification

Google Cybersecurity by Google on Coursera

Courses Completed | Grade Achieved

Python Task Automation | 92.87%

  • A beginner-level Python course with a focus on cybersecurity. Gained an understanding in fundamental Python concepts like data types, variables, and basic control structures. Gained practical skills in creating simple functions, working with strings and lists, utilizing regular expressions, and automating basic cybersecurity tasks involving file manipulation.

Basic Linux and SQL Skills | 96.30%

  • Studied the interplay between operating systems, applications, and hardware. Analyzed graphical user interfaces and command line interfaces. Acquired experience with Linux file system navigation and management through Bash shell commands. Gained practical experience in querying databases using SQL for information retrieval.

Foundations of Cybersecurity | 94.52%

  • Developed foundational skills and knowledge essential for aspiring cybersecurity analysts. Explored the repercussions of security attacks on business operations, delved into the ethical aspects of cybersecurity, and became proficient in recognizing the common tools utilized by cybersecurity professionals.

Detection and Response | 95.84%

  • Learned the fundamentals of incident response, including how to contain, eradicate, and recover from incidents. Explored the basics of packet analysis for understanding network communications. Got familiar with the basics of Intrusion Detection Systems (IDS) and Network Intrusion Detection Systems (NIDS) tools, including their syntax, signature components, and log interpretation. Acquired the ability to perform basic event investigations by running queries in Security Information and Event Management (SIEM) tools.

Assets, Threats, and Vulnerabilities | 91.25%

  • Learned asset classification, enabling effective risk assessment. Explored attack surface analysis for risk and vulnerability identification. Gained knowledge in recognizing various threats, including social engineering, malware, and web-based exploits.

Managing Security Risks | 100%

  • Learned to recognize key threats, risks, and vulnerabilities impacting business operations. Explored the utilization of security frameworks and controls for safeguarding organizational functions. Gained a clear understanding of commonly employed Security Information and Event Management (SIEM) tools. Acquired practical skills in responding to threats, risks, and vulnerabilities using playbooks.

Networks and Network Security | 95.25%

  • Explored network types and their components, gaining foundational knowledge. Illustrated the principles of data transmission within networks. Acquired skills in network security against intrusion tactics. Gained insights into system hardening techniques to enhance network security.
Shamair Ahmed