Accomplishments
Professional Achievements
Proofpoint
Information Protection Analyst Certification
Splunk
Splunk SOAR Certified Automation Developer
Crowdstrike
Crowdstrike Certified Falcon Responder
Elearning
Security Blue Team
Comptia
Security+
CYSA+
Network+
PenTest+
Security Analytics Professional CSAP+
Network Vulnerability Assessment Professional – CNVP
Network Security Professional – CNSP
AWS
Azure
AZ-900 Azure Fundamentals Certified Analyst
SC-900 Security, Compliance, and Identity Fundamentals
HDI
Support Center Analyst
Technical Support Professional
KCS V6.0 Foundations
Troubleshooting and Problem solving skills
Axelios
Recorded Future
Proofpoint
Certified DLP specialist
Proofpoint Certified Phishing Specialist 2022
Proofpoint Certified Security Awareness Specialist 2023
Proofpoint Certified Insider Threat Specialist 2023
Beyond Trust
Training Achievements
TCM Security
Linux 101
Open-Source Intelligence (OSINT) Fundamentals
Practical Ethical Hacking
Blue Team Online Labs
Phishing Analysis
Phishing Analysis 2
D3FEND
The Report
Meta
Shiba Insider
ATT&CK
Hashing and Strings
Portable Execution Analysis
Yara and Yargen
Portable Execution Analysis with Capa
PDF Analysis
Office Document Analysis
Monitoring Malicious Processes
Blackbox analysis – PDF file
Windows Program Execution
Hunting With Chainsaw
Windows System Hunt
Linux Log Analysis
Linux System Hunt
Beacon Detection with RITA and Wireshark
Hunting Empire C2
Host Discovery with Nmap
Vulnerability scanning with Nikto
Vulnerability scanning with WPScan
Blackbox Analysis – Office File
Blackbox Analysis – PE File
Velociraptor Hunting
Utilizing Sysinternals
Vulnerability scanning with OpenVAS
Vulnerability scanning with NSE
Analysis and Hunting (Search and Reporting App)
Analysis and Hunting (ThreatHunting App)
Adversary Emulation
Command-and-Control Detection
Crowdstrike
University Orientation
FHT 100 – Falcon Platform
FHT 101 Falcon Platform Technical Fundamentals
FHT 102 Falcon Platform
FHT 104 Activity App Fundamentals
FHT 105 Sensor Installation, Configuration and Troubleshooting
FHT 106 Customizable Dashboards
FHT 107 Falcon Firewall Management
FHT 109 Using MITRE ATT&CK
FHT 114 Falcon Fusion Fundamentals
FHT 120 Investigation Fundamentals
FHT 121 Spotlight App Fundamentals
FHT 122 Falcon Discover Fundamentals
FHT 130 Falcon Intelligence
FHT 140 Real Time Response
FHT 150 Incident Fundamentals
FHT 160 Falcon for Mobile
Falcon 104 – getting started with endpoint security module
Falcon 114 Falcon Fusion fundamentals
Falcon 115 – Create a Falcon Fusion workflow
Falcon 120 – Investigation Fundamentals
Falcon 140 – Real Time Response Fundamentals
Falcon 202 – Investigation and Querying Event Data with Falcon EDR
Falcon 240 – Investigating and Mitigating Threats with real time response
Recorded Future
Brand Intelligence
Geopolitical Intelligence
Third party Intelligence
Secops Intelligence
Threat Intelligence
Vulnerability Intelligence
Splunk
Developing SOAR playbooks
What is Splunk
Using Fields
Visualizations
Dashboards
Proofpoint
Threat Response Auto-Pull (TRAP) Foundations
TRP 102 – Threat Response Dashboard
TRP 103 – (Trap) administration
TRP 104 – (TRAP) Integration and incident response
Insider Threat Management (ITM) SaaS Foundations
TAP 101- Targeted Attack Protection Foundations
TAP102 – Targeted Attack Protection Threat Analysis
TAP 103 – Targeted Attack Protection Threat Reporting
TAP 104 – Targeted Attack Protection Tools and Settings
Isolation Features and Protections – Level 1
Udemy Training
SC-200 Microsoft Security Operations Analyst Course & SIMs
Complete Introduction to Cybersecurity 2023
How to Identify and combat Spam and Phishing Emails
Getting Started with Nmap: The Ultimate hands on course
Passing Certification Exams with Strategic Test Taking
Miscellaneous
Five Windows Forensic Artifacts for Every Incident Response
Is That Toaster On Your Threat Model?
Cloud Pentest Apocalypse
ChatGPT’s Risk: What’s Real and What can you do about it
Linux Command Line Dojo
1000 IR Labs at the same time. What Could Go Wrong
Forensicating Linux LD_Preload Rootkits
The Sysmon Update is Here
OSINT uncovered – Unlocking the hidden gems of online information
Exploring Powershell Logging with TellTail
Introduction to Web Application penetration testing methodology
Bring your own vulnerable Driver
The Illustrated Pentester
A brief Introduction to Cybersecurity in Space
Go St*lk Yourself – Privacy Through OSINT
How to Annoy Attackers so they Cry
Phishtory and the phuture of phishing
Hands on with the NIST Cybersecurity Framework 2.0
Security Split – Divorcing your stack
The Illustrated Pentester
Know the Unknowns – Exploring Breaches
Return on Influence (ROI) – Social engineering for Good
Burp Suite Basics