
Wireshark Configuration
Summary
Set up Wireshark, captured and filtered data packets.
Highly motivated and results-driven aspiring Cybersecurity Professional currently pursuing a comprehensive diploma at Altschool Africa. Eager to apply foundational knowledge in network security, cloud security, and threat analysis to real-world challenges. Proficient with industry-standard tools including AWS, GitHub, Kali Linux, Cisco Packet Tracer, and Wireshark. Seeking an internship role to learn and gain more hands-on experience with cybersecurity tools in real-world scenarios and grow within the dynamic cybersecurity domain.
→
Degree
Medical Laboratory Science
Fluent
Network Security, Cloud Security, Threat Analysis, Vulnerability Assessment, Incident Response, Access Control, Cryptography.
Linux (Ubuntu, Debian, Kali), Windows Server, Windows Client.
TCP/IP, OSI Model, Firewalls, VPNs, Routing, Switching.
AWS (Amazon Web Services), GitHub, Kali Linux, Cisco Packet Tracer, Wireshark.
Emerging Technologies, Cybersecurity Trends, Cloud Computing.
Continuous Learning, Online Courses, Certifications.

Summary
Set up Wireshark, captured and filtered data packets.

Summary
Set up a Virtual Machine and installed multiple operating systems on it.

Summary
Configured a network with subnetworks that could communicate with each other and added firewall rules.

Summary
Configured secure AWS environments, focusing on IAM, S3 bucket policies, and VPC security groups to ensure data confidentiality and integrity.