I am a self-motivated and passionate IT and cybersecurity student, driven by projects and creativity. My approach to learning is hands-on and project-based, allowing me to apply theoretical concepts in practical, real-world scenarios. This method not only deepens my understanding but also fuels my enthusiasm for continuous learning.
details about my projects will be available soon.
This article explains the four key components—identification, authentication, authorization, and auditing along with the different methods of authentication
This article explores each type and how they contribute to cybersecurity risks.
This article explores how expressive writing might improve your chances of getting a job
More details about my professional experience will be available soon.
details about my skills will be available soon.