cyber-defender-man

Course 4: Assets, Threats, and Vulnerabilities

Key Skills

Highlight

I conducted a vulnerability assessment for a Linux-based database system and recommended access control improvements, including MFA and encryption for data in transit.

Additionally, I completed a risk assessment and compliance checklist for a company’s security program, identifying gaps in encryption, password policies, and least privilege implementation.