Professional Documents
Culture Documents
My achievements
Deployment of that same application in Amazon Web Services on EC2 instances, Elastic
Beanstalk... with a database hosted on an RDS instance. Study of its maintenance and
safety. (Can only be visited when the lab is launched)
Creation of a network model with several computers and with different installed and
functional services (FTP, LDAP, PostgreSQL, Firewalls...) (Github)
Project to create a supposed Cybersecurity company from the business point of view.
· Python programming.
· Markup Languages. (HTML, CSS, XML, CSV, JSON...)
· Use and creation of Python Restful APIs.
· Creation and deployment in web application server environments with Python-based
frameworks.
· Cloud Computing.
· Amazon Web Services, use of its services and deployment of applications and services.
· Python connection with Databases through modules.
· Database management systems (Oracle, PostgreSQL, SQLite, MySQL, noSQL
Cassandra...)
· Creation and deployment of databases and schemes in management systems.
· Database queries.
· Database entity and relationship diagrams.
· Creation of Oracle RAIDS.
· Use of docker.
· I work with CMS.
· Programming in bash and cmd. (Linux and Windows)
· Linux and Windows Operating Systems.
· Installation of different Operating Systems.
· File systems in Operating Systems.
· Task scheduling on Windows and Linux.
· Systemd and sysvinit.
· Remote administration of Linux and Windows Operating Systems.
· Using virtual machines in KVM and Virtualbox.
· Use of document editors (OpenOffice, Excel... etc).
· Knowledge of the different starting systems.
· Basic Scala programming.
· Assembly and disassembly of computer equipment.
· Fundamental knowledge of hardware.
· Creation of an internal network at a physical and theoretical level.
· Use of Netkit, Kathara and Packettracer to propose possible networks.
· Layers of the OSI and TCP/IP model.
· Capture traffic with Wireshark.
· Creation of a DMZ.
· Cybersecurity knowledge. CIA Triad. Confidentiality, Integrity and Availability.
· Pentesting and use of tools to test virtual machine laboratories and detect vulnerabilities.
· Metasploit.
· Authentication, Identification, Authorization and Audit in Cybersecurity.
· Multi-factor authentication.
· Encryption, characteristics, types and algorithms.
· Basic knowledge of the world of work and business.