Google Cybersecurity Professional Certificate

Comprehensive Notes & Modules
Detailed notes, write-ups, and reflections for each module of the Google Cybersecurity Professional Certificate: risk management, network security, system hardening, SIEM & log analysis, incident response, and digital forensics.
View All Notes on GitHubLabs & Mini-Projects
Internal Audit – Botium Toys
Completed a simulated internal audit using the NIST Cybersecurity Framework. Evaluated risks, reviewed control categories, assessed GDPR/PCI compliance posture, and wrote detailed recommendations for improving security.
View Audit ReportOS Hardening Incident Analysis
Incident analysis response report to simulated brute-force attack, completed as extension of Operating Systems hardening module.
View AnalysisIncident Report – SYN Flood
Investigation and report on simulated SYN Flood attack patterns, as well as traffic and packet analysis findings and future mitigation techniques.
View ReportDNS & ICMP Analysis
Investigated a DNS failure using tcpdump and ICMP/UDP analysis. Found that the DNS server was rejecting queries with “port unreachable” errors, meaning likely downtime or firewall misconfiguration. Focused on clearly documenting findings.
View AnalysisBrief Network Hardening Analysis
Found & recommended remedies for a security breach which occurred within a virtual social media organization; performed security risk assessment.
View AnalysisICMP Flood - DDoS Attack - NIST CSF Incident Report
Analyzed a simulated DDoS attack targeting a company's internal network via an ICMP flood. Incident caused a complete network outage, traced to a misconfigured firewall. Documented using the NIST Cybersecurity Framework.
View ReportFile Directory Authorization Management
Demonstrated Linux file-permission management: examined current
permissions, interpreted the 10-character permission strings,
and used chmod
and ls -la
to
secure files and directories as part of a cybersecurity
portfolio activity.
Vulnerability Assessment Report – E-commerce Scenario
Conducted a vulnerability assessment of a simulated publicly accessible e-commerce database server using NIST SP 800-30 guidelines, calculated risk scores, identified threat sources/events, and proposed remediation strategies to secure the system.
View Assessment Report