Loading Sequence...
Empowering students.
Master ethical hacking, threat detection, and cloud security.
Prepare for CEH, PNPT, eJPT, and more.
Securing organizations.
Identify vulnerabilities through Penetration Testing & Red Teaming.
Secure systems strategically across AWS, Azure, and GCP.
Selected Works
Raspberry Pi Nextcloud with Tailscale
Secure, self-hosted cloud storage solution utilizing NAT Traversal and MagicDNS.
OpenWrt Pi4 Split Network
Advanced network segmentation for enhanced security and traffic control.
Pi Secure Auth Controller
Robust physical authentication system integrating multiple electronic sensors and relays.
NetGuard Pi RFID
RFID-based network access control system leveraging port mirroring and intrusion detection.
Work Experience
Offensive Security (Fellowship)
Vulnerability Assessment & Penetration Testing, Custom Tooling & Automation, Workflow Integration, Threat Modeling & Reconnaissance, and Technical Reporting.
Ethical Hacking Instructor
Delivered training on penetration testing, network security, and vulnerability assessments. Designed CEH, OSCP, and CompTIA Security+ aligned curriculum. Facilitated hands-on labs using Metasploit, Nmap, Wireshark, and Burp Suite, mentoring students through CTF challenges.
Certifications
Multi-Cloud Red Teaming Analyst
Practical Ethical Hacking
IBM and ISC2 Cybersecurity Specialist
Certified in Cybersecurity Specialization
Ultimate AWS Certified Solutions Architect Associate
Courses
Docker Training Course
KodeKloud
Kubernetes Lab
KodeKloud
Fundamentals of Red Hat Enterprise Linux
Coursera
Education
Bachelor's in Computer Science
Core academic focus on programming logic, network systems, and software engineering.
Intermediate in Computer Science
Foundational studies in mathematics, physics, and computer science concepts.
Let's Connect
Whether you're looking to secure your organization's infrastructure or want to learn the art of ethical hacking, my inbox is always open.