I have gained substantial experience in cybersecurity, focusing on Linux, penetration testing, and networking architecture, particularly the OSI model and port vulnerabilities. Besides my college courses, I have pursued self-directed learning through online courses on topics like SQL injection and various Capture the Flag (CTF) challenges, further honing my skills.
During this class, I gained a foundational understanding of networking theory and network architecture, along with an introduction to cybersecurity. I also learned about common vulnerabilities in core internetworking protocols and practiced mitigating these risks through hands-on lab exercises, which included working with basic Linux.
In this course, I explored various attack methodologies and learned the phases, tactics, and techniques used in penetration testing and ethical hacking. I gained hands-on experience in every stage of the process, from planning and intelligence gathering to exploiting vulnerabilities and post-exploitation reporting.