An open API service indexing awesome lists of open source software.

https://github.com/coolpenwin/coolpenwin


https://github.com/coolpenwin/coolpenwin

Last synced: 3 months ago
JSON representation

Awesome Lists containing this project

README

        


Gif de bienvenida



bye





HE/HIM

- FullSstack on [4 Geeks Academy](https://https://4geeksacademy.com/es/inicio)
- pc   I’m currently learning Cybersecurity on [CISCO](https://github.com/CiscoNetAcad) & [TheBridge](https://github.com/TheBridgeTech) and Robotics.
- diana   I’m looking for remote developer job.
- star   Most of my projects are available on [Github](https://github.com/CoolPenwin?tab=repositories).
- 🎥  
- diana  
- diana   I love technology, that's why I decided to take this career turn.
- speak   Ask me about anything information to me related, I am happy to answer.
- speak   Feel free to ping me on [LinkedIn](https://www.linkedin.com/in/alberto-r-m-48abaa32/).
- speak  




## Languages and Tools


html

html
CSS Icon
bootstrap logo



javascript
react
nodejs logo
npm
jquery
Jest Icon



git
bash
bash




python
Flask icon
mySQL






CC
CobolCOBOL
















Linux
Parrot


flipper-zero
usbkill
flipper-zero





Ubuntu


vscode


office365
office365
office365





















## Badges & Certificates


CISCO Introduction to Ethical Hacking and Penetration TestingAnálisis de amenazasAdministración de Ciberseguridad

In progress...
|html Cybersecurity Analyst Career Path | |
|-----|-----|

| Introduction to Cybersecurity | | Ethical Hacker | |
|----------|----------|----------|----------|
| Cybersecurity Administration | Análisis de amenazas | Introduction to Ethical Hacking and Penetration Testing | Introduction to Ethical Hacking and Penetration Testing |
| Threat Analysis | Administración de Ciberseguridad | Planning and Scoping a Pentest Assessment | |
| System Safeguards | | Information Gathering and Vulnerability Scanning | |
| Network Defense | | Social Engineering Attacks | |
| Resource Specialist | | Exploiting Wired and Wireless Networks | |
| | | Exploiting Application-Based Vulnerabilities | |
| | | Cloud, Mobile, and IoT Security | |
| | | Performing Post-Exploitation Techniques | |
| | | Reporting and Communication | |
| | | Tools and Code Analysis | |

| Networking Basics | | Networking Devices and Initial Configuration | |
|----------|----------|----------|----------|
| Network Basics | | Hierarchical Design and Number systems | |
| Network Access Basics | | Understanding Network Access | |
| Internet Protocol Basics | | Transport Services Basics | |
| Network Communications Basics | | Basic Cisco Configuration | |
| Networking Protocols Basic | | | |



| Endpoint Security | | Network Defense | | Cyber Threat Management | |
|----------|----------|----------|----------|----------|----------|
|Network Security Basics| | Network Defense | | Vulnerability Assessment and Risk Management | |
|Operating System and Endpoint Security| | Firewalls and Cloud Security | | Incident Response | |
||| Security Alerts | | | |



![CoolPenwin's GitHub stats](https://github-readme-stats.vercel.app/api?username=CoolPenwin\&rank_icon=github\&show_icons=true\&theme=blue-green\&title_color=00b3ff)
![CoolPenwin's current streak](https://streak-stats.demolab.com/?user=CoolPenwin&count_private=true&theme=blue-green&title_color=00b3ff)


1º 50d ago-oct 2024
2º 66d oct-dec 2024



3º +42d dec 2024 - current 2025



Buy Me a Coffee at ko-fi.com

snake

![](https://komarev.com/ghpvc/?username=CoolPenwin)