{"id":8,"date":"2025-12-08T13:40:11","date_gmt":"2025-12-08T13:40:11","guid":{"rendered":"https:\/\/cyberstec.com\/?page_id=8"},"modified":"2025-12-08T13:50:02","modified_gmt":"2025-12-08T13:50:02","slug":"about","status":"publish","type":"page","link":"https:\/\/cyberstec.com\/index.php\/about\/","title":{"rendered":"ABOUT"},"content":{"rendered":"\n<p>This website is a repository for my cybersecurity projects and a place to share ideas on InfoSec, technology and cloud computing. <\/p>\n\n\n\n<p>I have a background in digital design and 3D visualisation. I have also run my own business for a few years. I love working with businesses and contribute to their success. With cloud computing and data privacy being paramount to business and everyday life, I want to help companies and people keep their data safe and their systems resilient to threats. <br><br>I&#8217;m a certified Azure Security Engineer and keep learning about information security, governance, risk and compliance. Below, a growing list of knowledge and experience accrued. <\/p>\n\n\n\n<p>I also have a mentor in cyber governance which is helping me solidify and develop in this area: so grateful for it!<br><\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><br>CERTS:&nbsp;<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Microsoft Cybersecurity Analyst Professional<\/li>\n\n\n\n<li>MS AZ-500: Microsoft Azure Security Engineer Associate<\/li>\n\n\n\n<li>The GRC approach to managing cybersecurity &#8211; Kennesaw state uni <\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">PERSONAL PROJECTS AND LABS<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Try Hack Me labs, Advent of Cyber 2025<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Setup and configured Pfsense firewall<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Network segmentation on Unifi router and access point<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Built and configured Network Attached Storage (TrueNAS)<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Reviewing cybersecurity news daily\/weekly and analysing threat actor\u2019s tactics and techniques used, as well as best controls for each vulnerability. Sources include: Simply Cyber Daily threat brief, CISO series, Click Here podcast, Darknet Diaries)<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Microsoft Cybersecurity Analyst Professional: Network segmentation project + Capstone project<\/li>\n<\/ul>\n\n\n\n<hr class=\"wp-block-separator has-alpha-channel-opacity\"\/>\n\n\n\n<h3 class=\"wp-block-heading\">COURSES<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Comptia A+<\/li>\n\n\n\n<li>DR. CHUCK, Python for everyone<\/li>\n\n\n\n<li>Hands-on Python for networking professionals, ITPro.TV<\/li>\n\n\n\n<li>Reading: &#8220;Mastering Information Security Compliance Management&#8221; &#8211; ISO 2001:2022<\/li>\n\n\n\n<li>The Definitive GRC Analyst Master Class &#8211; Simply Cyber\n<ul class=\"wp-block-list\">\n<li>&nbsp;Prepared, executed, and reported on audit of subset of NIST SP 800-53 cybersecurity controls<br>to include interview, document review, and testing of systems to support compliance audit<br>activities.<\/li>\n\n\n\n<li>Knowledgeable on NIST Cybersecurity Framework and how the Identify, Protect, Detect,<br>Respond, and Recover categories comprise and facilitate an information security program<\/li>\n\n\n\n<li>Semi-quantitatively analysed cybersecurity risk using NIST SP 800-30 methodology to identify<br>highest risk weaknesses for a system<\/li>\n\n\n\n<li>Executed threat modeling exercise to determine higher likelihood threat events to inform<br>cybersecurity risk modeling<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This website is a repository for my cybersecurity projects and a place to share ideas on InfoSec, technology and cloud computing. I have a background in digital design and 3D&hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-8","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/pages\/8","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/comments?post=8"}],"version-history":[{"count":16,"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/pages\/8\/revisions"}],"predecessor-version":[{"id":121,"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/pages\/8\/revisions\/121"}],"wp:attachment":[{"href":"https:\/\/cyberstec.com\/index.php\/wp-json\/wp\/v2\/media?parent=8"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}