MY JOURNEY

Welcome! Here, I share my experiences, milestones, and reflections as I navigate the dynamic world of computer science and cybersecurity.

2021

The Spark

After my Facebook account was hacked, I became driven to understand how to protect myself and others, and to uncover how the attack was done.

2022

First Concepts

Took a security course as part of my degree. Learned that security is not only about protection but also about availability, as explained by the CIA triad.

2023

Hands-On Practice

Built a personal lab in VMware using Metasploitable, Windows 10 and Kali. Practiced offensive techniques and realized the critical role of a properly configured firewall.

2024

Skill Sharpening

Completed Bandit and Natas challenges on OverTheWire, strengthening my practical knowledge of Linux and web security fundamentals.

2025 Jan-May

Certifying the Knowledge

Finished all 10 OPSWAT Associate certifications, reinforcing my foundational expertise in security technologies.

June-Now

Expanding Horizons

Currently focusing on cloud security to align with evolving industry demands and further develop my practical capabilities.

REFLECTIONS & FUTURE GOALS

const myGoals = { shortTerm: ['Complete advanced certifications', 'Build a personal security lab', 'Contribute to open-source security tools'], longTerm: ['Specialize in threat intelligence', 'Lead security teams', 'Mentor new cybersecurity students'], current: { focus: 'Balancing theoretical knowledge with practical applications', philosophy: 'Security is not a product, but a process' } };

This journey has been one of continuous learning and adaptation. The ever-evolving landscape of cybersecurity means there's always something new to discover. My goal is to contribute meaningfully to creating a safer digital world, focusing on areas like threat intelligence and secure software development. I am always eager to connect with fellow enthusiasts and professionals in the field!

Skills Developed

Network Security
Penetration Testing
Security Analysis
Vulnerability Assessment
Incident Response
Malware Analysis
Digital Forensics
Cryptography