https://github.com/coolpenwin/coolpenwin
https://github.com/coolpenwin/coolpenwin
Last synced: 3 months ago
JSON representation
- Host: GitHub
- URL: https://github.com/coolpenwin/coolpenwin
- Owner: CoolPenwin
- Created: 2024-08-01T18:08:44.000Z (10 months ago)
- Default Branch: main
- Last Pushed: 2025-02-27T10:15:47.000Z (3 months ago)
- Last Synced: 2025-02-27T13:54:19.613Z (3 months ago)
- Size: 344 KB
- Stars: 3
- Watchers: 1
- Forks: 2
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
Awesome Lists containing this project
README
![]()
![]()
![]()
- FullSstack on [4 Geeks Academy](https://https://4geeksacademy.com/es/inicio)
-I’m currently learning Cybersecurity on [CISCO](https://github.com/CiscoNetAcad) & [TheBridge](https://github.com/TheBridgeTech) and Robotics.
-I’m looking for remote developer job.
-Most of my projects are available on [Github](https://github.com/CoolPenwin?tab=repositories).
- 🎥
-![]()
-I love technology, that's why I decided to take this career turn.
-Ask me about anything information to me related, I am happy to answer.
-Feel free to ping me on [LinkedIn](https://www.linkedin.com/in/alberto-r-m-48abaa32/).
-![]()
## Languages and Tools## Badges & Certificates
CISCO![]()
In progress...
|Cybersecurity Analyst Career Path | |
|-----|-----|
| Introduction to Cybersecurity | | Ethical Hacker | |
|----------|----------|----------|----------|
| Cybersecurity Administration || Introduction to Ethical Hacking and Penetration Testing |
|
| Threat Analysis || Planning and Scoping a Pentest Assessment | |
| System Safeguards | | Information Gathering and Vulnerability Scanning | |
| Network Defense | | Social Engineering Attacks | |
| Resource Specialist | | Exploiting Wired and Wireless Networks | |
| | | Exploiting Application-Based Vulnerabilities | |
| | | Cloud, Mobile, and IoT Security | |
| | | Performing Post-Exploitation Techniques | |
| | | Reporting and Communication | |
| | | Tools and Code Analysis | || Networking Basics | | Networking Devices and Initial Configuration | |
|----------|----------|----------|----------|
| Network Basics | | Hierarchical Design and Number systems | |
| Network Access Basics | | Understanding Network Access | |
| Internet Protocol Basics | | Transport Services Basics | |
| Network Communications Basics | | Basic Cisco Configuration | |
| Networking Protocols Basic | | | |
![]()
| Endpoint Security | | Network Defense | | Cyber Threat Management | |
|----------|----------|----------|----------|----------|----------|
|Network Security Basics| | Network Defense | | Vulnerability Assessment and Risk Management | |
|Operating System and Endpoint Security| | Firewalls and Cloud Security | | Incident Response | |
||| Security Alerts | | | |
![]()


1º 50d ago-oct 2024
2º 66d oct-dec 2024
3º +42d dec 2024 - current 2025