Certifications

In addition to my professional experience, I hold several certifications in security-related fields, including "Google" Cybersecurity certificates

These certifications have equipped me with a deep understanding of cybersecurity principles, risk management, and best practices for protecting sensitive information.

My passion for continuous learning and my dedication to staying updated with industry trends drive my professional growth and commitment to excellence. I am eager to leverage my expertise in cloud backup and security to contribute to innovative and secure solutions.

Google Cybersecurity Foundation

The Google Cybersecurity Foundation course covers the core principles and best practices essential for establishing a strong cybersecurity framework. Key topics include:

· CIA Triad and Security Principles: Emphasizes the importance of Confidentiality, Integrity, and Availability (CIA Triad) as foundational concepts, ensuring data protection through robust authentication, authorization, and adherence to security policies and procedures.

· Encryption and Cryptography: Covers encryption techniques, including symmetric and asymmetric encryption, hashing, and cryptographic key management to secure data in transit and at rest.

· Threat Landscape and Security Frameworks: Provides insight into various threats and attack vectors like malware and phishing, along with strategies to defend against them, and highlights the importance of security frameworks and standards such as NIST and ISO/IEC 27001 for implementing best practices and achieving compliance.

Managing Security Risk

Managing Security Risks: 

Risk Assessment and Identification:

Conduct thorough assessments to identify and prioritize potential security threats and vulnerabilities using techniques such as vulnerability assessments and threat modeling.

Risk Mitigation and Control Implementation:

Develop and implement appropriate security controls to mitigate identified risks, including technical measures like firewalls and administrative measures like policies and training programs.

Continuous Monitoring and Integration:

Continuously monitor and review the effectiveness of implemented controls, update risk assessments regularly, and integrate risk management into organizational processes to ensure ongoing protection against evolving threats.

    Network Security

    Network security in cybersecurity focuses on safeguarding data integrity, confidentiality, and availability within networked environments. This involves implementing robust access controls, authentication mechanisms, and encryption to protect against unauthorized access and data breaches. Utilizing firewalls, intrusion detection/prevention systems, and secure communication protocols ensures secure network traffic management and data transmission. Continuous monitoring of network activities enables early detection of threats, complemented by proactive incident response strategies for timely mitigation. Effective network security measures are essential for maintaining operational continuity and protecting sensitive information against evolving cyber threats.

    Through this course, I learned how to identify and evaluate organizational assets and understand their value to the business. I gained insights into recognizing various threats and vulnerabilities and analyzing how they interconnect. It helped me understand risk management strategies, including assessing potential impacts and implementing effective mitigation measures. I also explored cybersecurity frameworks like NIST and ISO 27001, which provide a structured approach to managing security. Additionally, I learned the importance of incident response planning and recovery processes to minimize the impact of security incidents. The course emphasized best practices, such as implementing preventive measures, continuous monitoring, and staying adaptable to evolving threats.


    Through this course, I gained hands-on experience with Linux and SQL, mastering essential Linux commands for navigation, file management, and automation through shell scripting. I also learned system administration basics like process and user management. On the SQL side, I developed skills in writing queries for managing and analyzing data, from basic operations to advanced features like joins and subqueries. The course taught me how to combine Linux and SQL for efficient data processing, enhancing my ability to manage and analyze complex datasets effectively.