Cybersecurity | Ethical Hacking | IT Infrastructure
Testing login vulnerabilities using Hydra in a controlled environment.
Monitoring IoT devices and detecting abnormal traffic patterns.
A cybersecurity enthusiast with experience in ethical hacking, network security, and IT infrastructure.