Professional Cybersecurity Analyst Portfolio This repository contains a curated collection of projects completed as part of the Google Cybersecurity Professional Certificate, demonstrating practical skills in network security, system hardening, risk assessment, incident response, and security automation.
The projects are organized by core cybersecurity domains, showcasing mastery of industry-standard tools, frameworks (like NIST CSF), and documentation best practices.
Portfolio Contents by Course Course 1 & 2: Foundations and Assets Folder
Project Description
Key Skills Demonstrated
01_First_Steps
Initial assessment of fundamental security concepts and threat landscapes.
Security Fundamentals, Risk Classification
02_Assets_Threats
Analysis of critical business assets, identification of high-priority threats, and development of defense strategies.
Asset Inventory, Threat Modeling, Vulnerability Identification
Course 3: Network Security & Architecture Folder
Project Description
Key Skills Demonstrated
03_Network_Architecture
Design of a secured network architecture (Defense in Depth, Zero Trust) and analysis of a DDoS incident using the NIST CSF.
Network Design, Firewall Policy, Incident Analysis, NIST CSF
Course 4: Operating Systems and System Hardening Folder
Project Description
Key Skills Demonstrated
04_Operating_Systems
Hands-on Linux security hardening report, focusing on managing file and directory permissions to enforce the Principle of Least Privilege (PoLP).
Linux Command Line, chmod / ls -la, Access Control Management
Course 5: Vulnerability Management and Remediation Folder
Project Description
Key Skills Demonstrated
05_Automation_and_Scripting
Comprehensive Vulnerability Assessment Report analyzing a high-risk system (public database) and outlining a remediation strategy based on NIST SP 800-30 Rev. 1.
Risk Assessment (Likelihood/Severity), Vulnerability Remediation, Stakeholder Communication
Course 6: Final Capstone Project Folder
Project Description
Key Skills Demonstrated
06_Final_Project
A complete Incident Handler's Journal that documents the investigation of real-world security events, showing proficiency in structured documentation and the use of core security tools (SIEM, WAF, Wireshark).
Incident Response Lifecycle, Documentation (The 5 W's), Tool Proficiency, Post-Incident Reflection