I am a self-motivated and passionate IT and cybersecurity student, driven by projects and creativity. My approach to learning is hands-on and project-based, allowing me to apply theoretical concepts in practical, real-world scenarios. This method not only deepens my understanding but also fuels my enthusiasm for continuous learning.
developed a comprehensive Information Security Policy for the Jewish General Hospital.
developed a Finance Department's Email and Malware Awareness Training with the help of my respectful classmate.
developed a browser extension that converts the webpage to word or pdf document using javascript libraries
The article examines the ethical complexities of hacking by exploring motivations such as preventing waste, political activism, and malicious intent.
This guide provides a step-by-step process for modifying a program’s binary to bypass the product key validation.
This article explains the four key components—identification, authentication, authorization, and auditing along with the different methods of authentication
This article explores each type and how they contribute to cybersecurity risks.
More details about my professional experience will be available soon.
details about my skills will be available soon.