Portfolio
This page contains various pieces of school work and projects that I have completed over the period of 2022 to 2025 at UAT.

Innovation Documentation
The original six page document outlining the innovation, research, design, and development process of what would become my Student Innovation Project.

Network Design Evaluation
Documentation consisting of a hypothetical office network design featuring a logical and physical network topology as well as a complete evaluation considering performance, scalability, security, reliability, cost, and potential challenges regarding the network design.

IoT Device Security Analysis Report
Complete documentation relating to the overall security of a self-purchased and chosen IoT device (a small IoT camera I purchased online). This document features a general overview of the device and all associated equipment (as found in public documentation), a data flow diagram, threat model, firmware analysis (using cloud-based analysis tools), smartphone application analysis (qark tool utilized within a Linux VM), hardware analysis (features a complete tear-down and hardware identification of the IoT device itself), and lastly a list of mitigations and recommendations.

AWS Automation Via Ansible Playbooks
Documentation featuring the setup of an AWS cloud environment via the use of Ansible, a Linux-based software of which is capable of various AWS automation features.

Digital Forensic Investigation Report
An investigation report regarding a hypothetical scenario revolving around the planning of an assassination attempt of a political figurehead. The investigation report largely features using a variety of computer forensic software for obtaining sufficient evidence in order to convict an individual of planning an assassination.

Personal Risk Assessment Presentation
A presentation targeted at an employers business and its other employees, this presentation features potential risk, mitigations, and recommendations for physical and online security. Additionally, there are also risks recommendations regarding laws and compliances.

Phishing Email Documentation
Documentation featuring open source intelligence gathering and research regarding a specific target for the sole purpose of developing a potential phishing email. The purpose of the document is to demonstrate social engineering.

Incident Response Plan (Ransomware)
A detailed document highlighting various procedures to take in the case of an incident involving a ransomware attack.

Network Diagrams and Documentation
Documentation featuring two functional network designs located in two different US cities (sales and call center). This documentation highlights the complete network diagrams of which I designed within Microsoft Visio, along with the addition of these two networks within Windows Server 2022's active directory (OU and user creation).