I had a thought at the back of my mind of how I could add to society with my ability in coding. Back in late 2017, I discovered my answer, not excessively clear where I was going but rather still had confidence subsequent to doing my exploration on the cybersecurity space.
I am a cybersecurity aficionado with +2 years of experience who is as of now joined up with experts of cybersecurity at Health Alliance working as a Penetration Tester.
Specialties:
Achievements:
Certifications:
- January 2021
- Credential ID : 8391770
- Credential URL : https://www.elearnsecurity.com/certification/verify?c=14255eae-50d9-491c-956c-9f013fc96809
- Septenber 2020
- Credential ID : 8391770
- Credential URL : https://www.elearnsecurity.com/certification/verify?c=14255eae-50d9-491c-956c-9f013fc96809
- February 2018
- Credential ID : SC-2a02ca910-420d47
- February 2018
- Credential ID : SC-2a02ca910-b85e56
- February 2018
- Credential ID :SC-2a02ca910-fdbd3f
- February 2018
- Credential ID : SC-2a02ca910-32ce1a
- January 2018
- Credential ID : SC-2a02ca910-bc4046
- January 2018
- Credential ID : SC-2a02ca910-30a954
- January 2018
- Credential ID :SC-2a02ca910-d2c74d
- January 2018
- Credential ID : SC-2a02ca910-a3b75
- PCAP badge - PTLP2803 (January 2021)
- White Badge - PTLW3435 (March 2021)
- Essential Badge - PTLE3753 (December 2020)
- Unix Badge - PTLU6255 (October 2020)
- Introduction Badge - PTLN12006 (October 2020)
August 2021 - Present
- Assist with scoping and leading engagements from kickoff through to remediation.
- Create and implement proficient security testing plans and test cases.
- Design and create penetration methods, scripts and tests.
- Simulate real life attacks on networks, firewalls, operating systems and web applications wherever they may be hosted including: on premise, IaaS and public cloud in accordance with the penetration testing methodology.
- Perform source code security reviews.
- Provide recommendations to improve security and reduce risk of compromise.
- Aided in documenting items such as methodology, process, etc. into a penetration testing playbook.
May 2020 - July 2021
February 2020 - March 2020
November 2018 - January 2019
2018 - 2020
The University of Waikato
The course helps us to get knowledge regarding technical, legal, policy and
management aspects of Cyber security with focusing on cloud computing technologies
and computer infrastructure. It also focuses on obtaining the skills regarding detecting
security breaches, preventative security and offensive security.
Courses:
1.COMPX518 -Cyber Security
2.COMPX542 -Web Search: Technical and Social Issues
3.LEGAL526 -Legal Aspects of Cyber Security
4.COMP514 -Carrier and ISP Networks
5.COMP527 -Cloud Computing Technologies and Security
6.COMP532 -Information Visualization
7.IRSST507-Cyber Security and Cyber Warfare
8.COMPX592 -Dissertation
- Static and Dynamic application security testing for Greenstone3 and Dspace.
- Created a tool to do pdf analysis to check whether it is malicious or not.
- Designed a security architecture for Greenstone3.
- Link :https://dl.acm.org/doi/abs/10.1145/3383583.3398612
2012 - 2015
Jagan Institute of Management Studies (JIMS, Rohini Sector-5)
The course helps us to obtain the skills regarding the software development areas in I.T languages like JAVA, C, C++, HTML, CSS, JavaScript and many more which are related to I.T industry.
Address
Hamilton, Waikato, New Zealand
alextudu@gmail.com