Hello, I'm Huzyepha.
I study cyber security @ Seneca College.
I am based in Toronto and my areas of interest include online/web security, digital privacy, malware analysis, and threat intelligence.

About Me

I am currently in the third year of attaining my bachelor's degree. The ever-evolving nature of cyber security deeply fascinates me. I love learning about the new ways something/someone can be protected. I also like to write blog posts, which can include guides, reviews or anything I want to give my thoughts on.

Cyber security aside, I also like design and creation. I had ideas I wanted to bring to life which lead me to learning web development as well. Hence the creation of this personal website. Moreover, I was also briefly interested in graphic design. For 2 years, I sold several of my designs. These commissions included thumbnails, profile pictures and banner art.

Outside of work, I love reading books. I also like watching movies, playing video games, and ranting about why Firefox is superior to Chromium based browsers.

Tools & Skills

Virtualization & Containerization
vmware logo
VMware
virtualbox logo
VirtualBox
microsoft azure logo
Azure
docker logo
Docker
kubernetes logo
Kubernetes
ansible logo
Ansible
Networking
wireshark logo
Wireshark
nessus logo
Nessus
Metasploit
Nmap
packet tracer logo
Packet Tracer
Programming
git logo
Git
python logo
Python
sql logo
SQL
html logo
HTML
css logo
CSS
javascript logo
JS ES6+
Database & Data Analysis
mysql logo
MySQL
elk stack logo
ELK Stack
splunk logo
Splunk
rapidminer logo
RapidMiner
snort logo
Snort

Projects

Digital Forensics Analysis

A case study primarily revolving around the analysis of hexdumps to recover hidden files. Individual bytes were examined to locate and restore any files that might otherwise have remained undetected. An examination of the file image structure is also performed , to inspect specific clusters and sectors. Doing so reveals the path to the root directory. Provides a comprehensive understanding of DFIR.

Root Certificate Authority Server

Involves setting up a secure root Certificate Authority (CA) server on a hardened virtual machine. The root CA will be used to sign SSL certificates to ensure secure communication. The project covers the full process, from initial VM hardening and CA setup to SSL certificate signing, providing a comprehensive look at digital security implementation.

Anomaly Detection and Data Analysis

Showcasing the capabilities of Elasticsearch, Logstash, and Kibana in managing, processing, and visualizing data. Raw data in .CSV files are ingested through pipelines and are made into beautiful visualizations. These visualizations provided insight and comparisons between normal vs malicious traffic.