A sleek, dark brushed-metal laptop open on a clean white desk, its screen displaying a high-contrast network diagram with glowing blue nodes and connecting lines, symbolizing cybersecurity defenses. Around it lie a neatly arranged black notebook, a silver pen, and a compact router with softly illuminated status lights. The scene is set in a minimalist, modern workspace with a blurred server rack in the distant background. Cool, diffused daylight enters from the left, creating gentle reflections on the laptop chassis and subtle shadows on the desk. Photographic realism, eye-level composition with shallow depth of field keeps the laptop and diagram in crisp focus, conveying a professional, focused, entry-level cybersecurity portfolio atmosphere.

Selected Projects

Delve into detailed writeups of each project, including objectives, approaches, and measurable outcomes that demonstrate cybersecurity growth.

A close-up of a secure server rack in a modern data center, filled with matte black servers, each with tiny blue and green LED lights forming precise patterns. In the foreground, a brushed-steel padlock rests on a coiled blue Ethernet cable atop a reflective black surface, symbolizing protected networks. The environment is clean, with geometric lines and faint reflections from glass doors. Cool overhead LED lighting casts controlled highlights on the padlock and cable while leaving the background slightly darker. Shot with a slightly low angle and shallow depth of field, the focus centers on the padlock and cable. Photographic realism, clean and modern, with a serious, professional mood emphasizing cybersecurity defense and reliability.
A polished wooden desk featuring an organized cybersecurity project workspace: an open dark-grey laptop showing a terminal window with neat, readable code, a printed vulnerability assessment report with highlighted sections, and a small stack of neatly labeled USB drives in a metallic tray. A subtle network topology sketch is visible on a white notepad, drawn with precise lines. Soft afternoon light from a nearby window casts warm, natural illumination, creating gentle shadows and highlighting the paper texture and brushed aluminum laptop finish. The background fades into a blurred, neutral wall with a subtle framed abstract circuit-pattern artwork. Photographic realism, slightly elevated angle with rule-of-thirds composition, projecting a disciplined, hardworking, entry-level professional preparing portfolio materials.
An overhead photographic view of a dark, textured desk surface showcasing cybersecurity learning in progress: a slim black laptop displaying a colorful dashboard of security alerts, an open textbook on information security with annotated sticky notes, and a spiral notebook filled with neatly written bullet points and hand-drawn network diagrams. A metallic-blue USB security key and a locked external hard drive lie to the side, adding emphasis on data protection. Cool, soft desk-lamp lighting pools gently around the center of the scene, leaving the edges subtly vignetted. The composition is balanced and tidy, with sharp focus across the frame, creating a studious, determined mood. Photographic realism with a professional, academic aesthetic suited for showcasing program-based cybersecurity projects.
A sleek, dark brushed-metal laptop open on a clean white desk, its screen displaying a high-contrast network diagram with glowing blue nodes and connecting lines, symbolizing cybersecurity defenses. Around it lie a neatly arranged black notebook, a silver pen, and a compact router with softly illuminated status lights. The scene is set in a minimalist, modern workspace with a blurred server rack in the distant background. Cool, diffused daylight enters from the left, creating gentle reflections on the laptop chassis and subtle shadows on the desk. Photographic realism, eye-level composition with shallow depth of field keeps the laptop and diagram in crisp focus, conveying a professional, focused, entry-level cybersecurity portfolio atmosphere.

Projects Overview

Explore a selection of cybersecurity projects I built and tested during my program. Each entry highlights goals, methods, and the impact on security.

Project writeups

Each post explains the problem, the tools and techniques used, and the impact on defense, highlighting collaboration, learning, and practical results.