Corbiere 1
If you want to know

WHOAMI

A cybersecurity, networking and more...

About me

Hello! I'm a dedicated cybersecurity and DevOps enthusiast with a passion for exploring the intricate world of technology. My journey began with a deep interest in networking and reverse engineering, which naturally led me to the field of cybersecurity. Over the years, I've honed my skills in penetration testing, malware analysis, and ethical hacking, always striving to stay ahead of the curve in this ever-evolving domain.

In the realm of cybersecurity, I have extensive knowledge in Network Programming (TCP connect,...), SIEM (AlienVault, Splunk), IPS/IDS (Suricata, Snort,...), Firewalls (Cisco ASA, Palo Alto,...), Networking (CCNA), Digital Forensics (Wireshark, OSINT, Xplico,...), Reverse Engineering (Ghidra, IDA,...), and more.

As a DevOps Architect, I specialize in CI/CD (GitHub CI/CD, GitLab CI, Jenkins,...), Infrastructure as Code (Terraform, Ansible,...), Microservices, Webservices (AWS), Prometheus, and other related technologies.

My approach to cybersecurity is holistic, combining technical prowess with a strategic mindset. I enjoy dissecting complex problems, whether it's through vulnerability assessments, threat modeling, or incident response. My goal is to build secure systems that can withstand the ever-growing landscape of cyber threats.

Outside of work, I am an avid learner and contributor to the open-source community. I love sharing knowledge through blogs, workshops, and collaborative projects. Whether it's developing new security tools, participating in capture-the-flag (CTF) competitions as a newbie, or exploring the latest advancements in cloud security, I'm always eager to expand my horizons and connect with like-minded professionals. Additionally, I enjoy playing games from Hoyoverse such as Genshin Impact, Honkai Impact 3, and Honkai Star Rail.

Let's connect and embark on this exciting journey together, leveraging the power of cybersecurity and DevOps to create a safer digital world!

GitHub Stats
Resource Image

Legal Compliance Statement

All activities conducted through this platform are strictly for educational and legal purposes only. We operate under ethical hacking principles and comply with all relevant cybersecurity laws and regulations.

⚠️ Legal Disclaimer: Users accessing this website acknowledge that they are responsible for their own actions. Any misuse of the information provided here for malicious purposes is strictly prohibited and may result in legal consequences.

CyberSecurity Tools

A crucial role in protecting digital assets and ensuring the safety of information systems. These tools are essential for education and practical application in real-world scenarios, helping professionals to detect, analyze, and mitigate cyber threats effectively.

CyberSecurity News

Stay updated with the latest cybersecurity news with ViettelCyberSecurity.

Cybersecurity News
Read More News

Your CyberSecurity Journey

Best of luck on your cybersecurity journey! Remember that continuous learning and persistence are key to success in this ever-evolving field.

CyberSecurity Journey

Photo Source from (2024) Cipher Legion Pvt. Ltd.

About This Resource

This comprehensive guide introduces Python programming for ethical hacking and cybersecurity. Learn how to create security tools, automate penetration testing, and understand the technical aspects of cybersecurity through practical Python examples.

  • • Use this knowledge only on systems you have explicit permission to test
  • • Not use these techniques for malicious purposes
  • • Comply with all applicable laws and regulations

Get In Touch

Other Ways to Connect

Feel free to reach out through any of these platforms