All Posts

  • Published on
    I emphasize the critical importance of the OWASP Top 10 in ensuring robust application security and safeguarding digital assets. By addressing common vulnerabilities outlined in the list, I demonstrate a proactive approach to mitigating cyber threats, enhancing resilience, and fostering a culture of security within organizations
  • Published on
    In this lab, I delved into the intricate task of configuring application protocols such as HTTP, FTP, and SMTP. Through practical exercises, I gained hands-on experience in optimizing network functionality for diverse applications.
  • Published on
    In the Web Security Lab, I conducted penetration testing using tools like BurpSuite, OWASP ZAP, and Nikto on vulnerable web applications. I identified critical vulnerabilities such as SQL injection and XSS and implemented robust security controls on Ubuntu VM to mitigate these risks.
  • Published on
    In the Cloud Security Operations Lab, I designed and secured complex cloud environments, leveraging Ubuntu for managing security operations.