π Cyber Security Graduate | Blue Team | Malware Analysis
π Computer Science & Data Science β Cyber Security Specialization
π Egypt
I am a Cyber Security graduate with strong knowledge across multiple programming and scripting languages, operating systems, networking, and defensive security concepts.
My focus is on:
- Blue Team & SOC operations
- Malware analysis and threat detection
- Security monitoring and incident response
- Using programming and scripting to support security analysis, automation, and research
Currently preparing for CEH and CCNA certifications.
- Malware Analysis (Static & Dynamic)
- Vulnerability Assessment & Threat Detection
- Log Analysis & SIEM Concepts
- Incident Response (Foundations)
- Encryption & Cryptography Fundamentals
- Network Security & Traffic Analysis
- TCP/IP, OSI Model
- Ports, Protocols, Firewalls
- IDS/IPS Concepts
- Network Scanning & Analysis
- CCNA-level Networking
- Linux (Kali Linux, Ubuntu)
- Windows (Processes, Logs, Security Internals)
I use programming and scripting languages as tools for security, analysis, and automation, not just development.
- Python β Security scripts, automation, malware analysis
- Bash β Linux automation & security tasks
- C++ β Low-level concepts, memory & malware behavior
- Java β Application logic & security understanding
- PHP β Web security awareness
- JavaScript β Client-side security concepts
- HTML & CSS β Web structure and attack surface understanding
- R β Data analysis & security research
- Nmap
- Wireshark
- Metasploit (Basic)
- YARA (Rule Writing)
- VMware (Labs & Virtualization)
- SIEM Concepts (Monitoring & Alerts)
Bachelorβs Degree in Computer Science & Data Science
Specialization: Cyber Security
Grade: Very Good
Cyber Security Training β 120 Hours
July 2024 β August 2024
- Computer Network Fundamentals
- Advanced Networking
- Cyber Security Essentials
- Ethical Hacking
- Palo Alto Essentials (PCCET)
- FortiGate NSE 4
- Python Programming (MaharaTech)
- VMware Cloud Foundation
π Malware Analysis
- Static and dynamic analysis of malicious executables
- Understanding malware behavior and persistence mechanisms
π‘ Security & Networking Labs
- Network scanning and traffic analysis
- Vulnerability identification using Linux security tools
π Detection & Rules
- Writing YARA rules for malware detection
(Repositories will be updated regularly with new labs and research)
- CEH β Certified Ethical Hacker
- CCNA β Cisco Certified Network Associate
- Work in SOC / Blue Team environments
- Advance in malware analysis and threat hunting
- Strengthen defensive security and detection capabilities
- Contribute to cybersecurity research and open-source projects
- GitHub: https://github.com/7amo127
β Follow my repositories to see my cybersecurity journey and hands-on work.