{"id":8,"date":"2025-12-08T13:40:11","date_gmt":"2025-12-08T13:40:11","guid":{"rendered":"https:\/\/cyberstec.com\/?page_id=8"},"modified":"2026-05-03T17:36:53","modified_gmt":"2026-05-03T17:36:53","slug":"about","status":"publish","type":"page","link":"https:\/\/cyberstec.com\/index.php\/about\/","title":{"rendered":"ABOUT"},"content":{"rendered":"\n<p>Hi, nice to have you here!<\/p>\n\n\n\n<p>This site includes my study notes and is meant to be a place to reference information, reflect on projects and share ideas around cyber resilience, tech and cloud computing. <br>I want to help people and organisations keep their data secure: this is my learning repository and blog. <\/p>\n\n\n\n<p>Below, a growing list of knowledge and experience accrued.<\/p>\n\n\n\n<p>I also have a mentor in cyber governance which is helping me solidify and develop in this area: so grateful for it!<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br>CERTS:&nbsp;<\/h3>\n\n\n\n<p><strong>The GRC approach to managing cybersecurity &#8211; Kennesaw state uni<\/strong><\/p>\n\n\n\n<p><strong>AZ-500: Azure Security Engineer Associate<\/strong> <\/p>\n\n\n\n<p>Managing the security posture | Implementing threat protection | Identifying and remediating vulnerabilities.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Secure identity and access<\/li>\n\n\n\n<li>Secure networking<\/li>\n\n\n\n<li>Secure compute, storage, and databases<\/li>\n\n\n\n<li>Secure Azure using Microsoft Defender for Cloud and Microsoft Sentinel<\/li>\n<\/ul>\n\n\n\n<p><strong>Microsoft Cybersecurity Analyst Professional Certificate<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li class=\"has-regular-font-size\">Cybersecurity concepts and how they apply to a business environment, threat mitigation strategies from an enterprise perspective, cybersecurity policy measures within an Azure environment, and practice on tools like MS defender, Azure Active Director. A comprehensive course on cloud computing and network security fundamentals, threat modeling and Azure services.<\/li>\n<\/ul>\n\n\n\n<p><strong>Microsoft Cybersecurity Analyst Professional<\/strong><\/p>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">PROJECTS AND LABS<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>LetsDefend SOC Analyst path<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Setup and configured Pfsense firewall<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Network segmentation on Unifi router and access point<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Built and configured Network Attached Storage (TrueNAS)<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reviewing cybersecurity news daily\/weekly and analysing threat actor\u2019s tactics and techniques used, as well as best controls for each vulnerability. Sources include: Simply Cyber Daily threat brief, CISO series, Click Here podcast, Darknet Diaries)<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Microsoft Cybersecurity Analyst Professional: Network segmentation project + Capstone project<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">COURSES<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Comptia A+<\/li>\n\n\n\n<li>DR. CHUCK, Python for everyone<\/li>\n\n\n\n<li>Hands-on Python for networking professionals, ITPro.TV<\/li>\n\n\n\n<li>Reading: &#8220;Mastering Information Security Compliance Management&#8221; &#8211; ISO 2001:2022<\/li>\n\n\n\n<li>The Definitive GRC Analyst Master Class &#8211; Simply Cyber\n<ul class=\"wp-block-list\">\n<li>&nbsp;Prepared, executed, and reported on audit of subset of NIST SP 800-53 cybersecurity controls<br>to include interview, document review, and testing of systems to support compliance audit<br>activities.<\/li>\n\n\n\n<li>Knowledgeable on NIST Cybersecurity Framework and how the Identify, Protect, Detect,<br>Respond, and Recover categories comprise and facilitate an information security program<\/li>\n\n\n\n<li>Semi-quantitatively analysed cybersecurity risk using NIST SP 800-30 methodology to identify<br>highest risk weaknesses for a system<\/li>\n\n\n\n<li>Executed threat modeling exercise to determine higher likelihood threat events to inform<br>cybersecurity risk modeling<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hi, nice to have you here! This site includes my study notes and is meant to be a place to reference information, reflect on projects and share ideas around cyber&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-8","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/pages\/8","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/comments?post=8"}],"version-history":[{"count":20,"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/pages\/8\/revisions"}],"predecessor-version":[{"id":165,"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/pages\/8\/revisions\/165"}],"wp:attachment":[{"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/media?parent=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}