🔐 Network Vulnerability Analysis
Tool used: Kali Linux, Nmap
I scanned a simulated network for weaknesses and suggested security improvements.
☁️ Deploying a Cloud Storage System
Platform: AWS S3
I created secure access to a cloud-based file storage system using IAM roles.