Hello!
I'm Tettei Shahday-Annang, an IT professional with a background in network administration and software development. My fascination with cybersecurity began in 2010 when I tracked down a stolen phone using my technical skills. Today, I'm dedicated to safeguarding digital spaces and invite you to explore my journey into cybersecurity on this website.
View my RESUME for additional details.
Projects
Update A File Through A Python Algorithm
Posted on:February 7, 2024 at 11:19 AMAt my workplace, we manage who can see certain content by using a list of approved IP addresses called the `allow_list.txt` file.
Incident Handler's Journal
Posted on:January 31, 2024 at 02:32 AMDuring my progression through the Google Cybersecurity Professional course, I consistently employed a structured template to meticulously document my insights following each activity completion or to jot down comprehensive notes elucidating my grasp of a particular tool or concept.
Analyze a vulnerable system for a small business
Posted on:January 23, 2024 at 11:17 AMThis project was completed during my enrollment in the Google Cybersecurity Professional course. In this activity, I conducted a vulnerability assessment for a small business, evaluating the risks associated with a vulnerable information system and outlining a remediation plan.
Apply Filers to SQL Queries
Posted on:January 14, 2024 at 05:27 AMOur organization is actively enhancing the security of its system, and I am responsible for ensuring its safety.
File Permissions in Linux
Posted on:January 11, 2024 at 03:57 AMIn Google's Cybersecurity Professional course, I actively contributed to a critical project within the research team at my organization.
Incident Report Analysis
Posted on:December 7, 2023 at 01:25 PMAs an integral component of the Google Cybersecurity Professional course, I executed an incident report centered on the analysis of DNS and ICMP traffic in transit, utilizing data from the tcpdump network protocol analyzer tool.
Security Risk Assessment Report
Posted on:December 6, 2023 at 08:53 AMIn the context of the Google Cybersecurity Professional course curriculum, I encountered a scenario involving a social media organization that recently suffered a significant data breach due to undetected vulnerabilities.
Security Incident Report
Posted on:December 5, 2023 at 06:05 AMAs an essential element of the Google Cybersecurity Professional program, I assumed the role of a cybersecurity analyst tasked with addressing a security concern on the website hosted by the company, yummyrecipesforme.com.
Cybersecurity Incident Report: Analyze Network Attacks
Posted on:December 4, 2023 at 03:52 AMAs a crucial element within the curriculum of the Google Cybersecurity Professional course, I played a pivotal role in identifying the root cause of a service interruption.
Cybersecurity Incident Report: Network Traffic Analysis
Posted on:December 3, 2023 at 03:52 PMAs an integral component of the Google Cybersecurity Professional course, I executed an incident report centered on the analysis of DNS and ICMP traffic in transit, utilizing data from the tcpdump network protocol analyzer tool.
Internal Security Audit for Botium Toys
Posted on:November 16, 2023 at 12:40 PMAs an integral facet of the Google Cybersecurity Professional course, I conducted an internal security audit for the fictional company Botium Toys.
Recent Posts
Update A File Through A Python Algorithm
Posted on:February 7, 2024 at 11:19 AMAt my workplace, we manage who can see certain content by using a list of approved IP addresses called the `allow_list.txt` file.
Incident Handler's Journal
Posted on:January 31, 2024 at 02:32 AMDuring my progression through the Google Cybersecurity Professional course, I consistently employed a structured template to meticulously document my insights following each activity completion or to jot down comprehensive notes elucidating my grasp of a particular tool or concept.
Beginner's Guide to Navigating and Managing Files in Linux
Posted on:January 30, 2024 at 01:24 AMAre you just starting your journey into the world of cybersecurity? One of the fundamental skills you'll need is navigating and managing files in a Linux environment.
Analyze a vulnerable system for a small business
Posted on:January 23, 2024 at 11:17 AMThis project was completed during my enrollment in the Google Cybersecurity Professional course. In this activity, I conducted a vulnerability assessment for a small business, evaluating the risks associated with a vulnerable information system and outlining a remediation plan.