Hello!👋
I'm Tettei Shahday-Annang, a tech enthusiast and aspiring cybersecurity defender. My journey started as an IT technician, but curiosity led me deeper—into the exciting world of cybersecurity. Armed with certifications like CompTIA Security+ and ISC2 Cybersecurity, I'm ready to protect digital fortresses. Bridging IT and web development gives me a unique perspective—one that's both practical and protective. Let's chat about threat hunting, incident response, or anything crypto-related! Connect with me here or drop me an email at tettei[at]tetteis[dot]com. Together, we'll make the digital world safer! 🚀🔐👨💻
View my RESUME for additional details.
Projects
Tracking User Events and Generating Reports in Python
Posted on:April 7, 2024 at 04:27 PMIn the world of IT, tracking user events and generating reports are common tasks. Python, with its simplicity and versatility, offers powerful tools to automate such tasks.
Building a Simple Port Scanner in Python from Scratch
Posted on:March 6, 2024 at 09:47 AMAre you curious about network security or looking to understand how port scanning works? In this beginner-friendly tutorial, we'll walk through building a simple port scanner in Python from scratch.
Update A File Through A Python Algorithm
Posted on:February 7, 2024 at 11:19 AMAt my workplace, we manage who can see certain content by using a list of approved IP addresses called the `allow_list.txt` file.
Incident Handler's Journal
Posted on:January 31, 2024 at 02:32 AMDuring my progression through the Google Cybersecurity Professional course, I consistently employed a structured template to meticulously document my insights following each activity completion or to jot down comprehensive notes elucidating my grasp of a particular tool or concept.
Analyze a vulnerable system for a small business
Posted on:January 23, 2024 at 11:17 AMThis project was completed during my enrollment in the Google Cybersecurity Professional course. In this activity, I conducted a vulnerability assessment for a small business, evaluating the risks associated with a vulnerable information system and outlining a remediation plan.
Apply Filers to SQL Queries
Posted on:January 14, 2024 at 05:27 AMOur organization is actively enhancing the security of its system, and I am responsible for ensuring its safety.
File Permissions in Linux
Posted on:January 11, 2024 at 03:57 AMIn Google's Cybersecurity Professional course, I actively contributed to a critical project within the research team at my organization.
Incident Report Analysis
Posted on:December 7, 2023 at 01:25 PMAs an integral component of the Google Cybersecurity Professional course, I executed an incident report centered on the analysis of DNS and ICMP traffic in transit, utilizing data from the tcpdump network protocol analyzer tool.
Security Risk Assessment Report
Posted on:December 6, 2023 at 08:53 AMIn the context of the Google Cybersecurity Professional course curriculum, I encountered a scenario involving a social media organization that recently suffered a significant data breach due to undetected vulnerabilities.
Security Incident Report
Posted on:December 5, 2023 at 06:05 AMAs an essential element of the Google Cybersecurity Professional program, I assumed the role of a cybersecurity analyst tasked with addressing a security concern on the website hosted by the company, yummyrecipesforme.com.
Cybersecurity Incident Report: Analyze Network Attacks
Posted on:December 4, 2023 at 03:52 AMAs a crucial element within the curriculum of the Google Cybersecurity Professional course, I played a pivotal role in identifying the root cause of a service interruption.
Cybersecurity Incident Report: Network Traffic Analysis
Posted on:December 3, 2023 at 03:52 PMAs an integral component of the Google Cybersecurity Professional course, I executed an incident report centered on the analysis of DNS and ICMP traffic in transit, utilizing data from the tcpdump network protocol analyzer tool.
Internal Security Audit for Botium Toys
Posted on:November 16, 2023 at 12:40 PMAs an integral facet of the Google Cybersecurity Professional course, I conducted an internal security audit for the fictional company Botium Toys.
Recent Posts
Tracking User Events and Generating Reports in Python
Posted on:April 7, 2024 at 04:27 PMIn the world of IT, tracking user events and generating reports are common tasks. Python, with its simplicity and versatility, offers powerful tools to automate such tasks.
Building a Simple Port Scanner in Python from Scratch
Posted on:March 6, 2024 at 09:47 AMAre you curious about network security or looking to understand how port scanning works? In this beginner-friendly tutorial, we'll walk through building a simple port scanner in Python from scratch.
Update A File Through A Python Algorithm
Posted on:February 7, 2024 at 11:19 AMAt my workplace, we manage who can see certain content by using a list of approved IP addresses called the `allow_list.txt` file.
Incident Handler's Journal
Posted on:January 31, 2024 at 02:32 AMDuring my progression through the Google Cybersecurity Professional course, I consistently employed a structured template to meticulously document my insights following each activity completion or to jot down comprehensive notes elucidating my grasp of a particular tool or concept.