Welcome to my portfolio. You’ll find a selection of my work. Explore my projects to learn more about what I can do.
Project 2: IoT - Smart Home Automation and Security system
I will be creating a Smart Home Automation and Security System. This Smart Home System will be monitoring the conditions of a home by:
-
A door sensor to check if the door is open or not.
-
Distance sensor to monitor for a possible home intruder
-
Automated Lights according to the proximity of an intruder.
-
A display of security awareness.
Click on the power point link to download the presentation!
Project 3: Programming with Data
This project works with:
​
-
Python
-
Microsoft Excel
-
SQL
-
Visio
​
Data is growing at an exponential rate.
This project shows the gathering, analyzing and using that data into information sets that can be used now and in the future for predictions.
Implementing analysis through Python and Excel I create a storage, extraction, and a way to process and read the data collected.
​
A valuable hands-on experience in generating data-driven insights. Through Python programming and integrating libraries and modules to collaborate with cloud services such as the NOAA weather database gives the ability to effectively analyze data. Working with SQL databases visually presents the ability of connectivity and the power of data and management on a larger scale.
​
Click on the power point link to download the presentation!

Project 4: NIST Cybersecurity Framework
This report examines the NIST Cyber Security Framework which is offered by the Multi-State Information Sharing & Analysis Center (MS-ISAC) as a guide for the Nationwide Cybersecurity Review (NCSR) and MS-ISAC members, provided by the State of New York and State of California. This framework can be customized and used as an outline by any organization.
Overall knowing the NIST Frameworks promotes innovation and industrial advances done by measuring science, standards and technology for economic security and the betterment of a quality life.
​
The policies included in this report:
-
Security Awareness and Training Policy
-
Contingency Planning Policy
-
Risk Assessment Policy
-
Access Control Policy
-
Vulnerability Scanning Standard
-
Encryption Standard, Physical and Environmental Protection Policy
-
Secure System Development Life Cycle Standard
-
Cyber Incidence Response Standard
-
Personnel Security Policy
​
Click on the Power Point and Word document to download the analysis and presentation. PDF of NIST provided on Adobe link!

Project 5: IoT - Smart Traffic Light Controller
This project introduces an IoT device that will be emulating a multi-traffic control system with an ESP32 Microcontroller, wireless web application, and a smart sensor. We will be building and programming the device, configuring all hardware, and securing the connectivity to be controlled by a phone application.
​
Inventory:
•ESP32 Microcontroller
•Breadboards
•Wires
•Colored LEDs: Red, Yellow, Green and Blue.
•LCD Unit with a 12C Adapter
•Active Buzzer
•Mini Router
•Push Button
​
Click on the Power Point link to download the Presentation!

Project 6: Network Infrastructure Showcase
The Network 191 course emphasizes the significance of network management and connectivity within the small home office (SOHO) router network and beyond into larger enterprise networks.
​
We use a Hyper-V with Ubuntu virtual machines throughout this project.
​
The importance in learning about DHCP servers or by static addressing with correct configuration, route assignments, segmenting, subnetting, and testing network connectivity between multiple virtual machines. Successful pinging between machines alongside a network topology diagram illustrate a successful connection.
Practicing with a TP-Link router emulator furthers understanding of security requirements such as WPA2-PSK AES encryption or MAC Filtering. While challenges lie ahead, the career skills gained outweigh the complexities of networking.
​
Click on the power point link to download the presentation!

Project 7:
Provisioning Cybersecurity
​
-
Encryption
-
Firewall Rules
-
Policy
-
Vulnerability Assessment
This project presents an approach to tackling challenges of cybersecurity threats and data breaches. I will be deploying asymmetric encryption for data protection, MFA for secure sign, establishing stateful firewall rules with iptables to secure a Linux server, and a multilayered vulnerability assessment utilizing tools like: Nmap, Wireshark, and Nessus. Key component is the development of a thorough BYOD policy tailored to a fictional corporation to balance the convenience of personal device usage and security considerations.
​
Click on the power point link to download the presentation!

Project 8: Cloud Services
​
-
Virtual Machine Instances
-
Azure VNets and Subnets
-
Azure VM Security
-
Cloud Storage
-
Cloud Monitoring
This project dives into Microsoft Azure's cloud services. From creating VM instances, managing VM and servers, subnetting, network security configuration, working with snap shots and versions, to proactive monitoring via alert rules. The technical skills that demonstrated are applicable today and the approach to a secure and efficient cloud deployment is always the primary goal.
​
Click on the power point link to download the presentation!

Project 9: Stock Manager Application
​
This project involved developing a comprehensive Stock Management GUI application using Python. The project focused on creating a user-friendly interface to manage, track, and analyze stock data.
Key features include data import from CSV files, real-time visualization of stock performance through charts, and detailed profit/loss reporting.
Throughout the development process, I honed my skills in object-oriented programming, GUI development with tkinter, and data visualization using Matplotlib. This project showcases my ability to integrate complex backend logic with an intuitive front-end interface, resulting in a robust and functional application.

Project 10: Exploring Network Intrusion Detection, SSL/TLS Security, Firewall Configuration, and More
​​
This project explores core cybersecurity concepts through hands-on exercises, including network traffic analysis (Wireshark, Snort), SSL/TLS encryption, intrusion detection, live memory forensics, and firewall configuration. These skills align with real-world IT security practices and CompTIA CySA+ objectives, preparing for threat detection, incident response, and network defense.

Project 11: Optimizing Digital Signals Across Mediums
​​
What are digital communication systems through signal modulation, PCM encoding, cabling standards, antenna behavior, and BER analysis over fading channels? Here I will demonstrate practical applications of transmission theory, network design, and signal performance optimization across wired and wireless mediums using simulation tools, technical research, and real-world communication principles.


