David Glass’s Professional Portfolio
Hello, I’m David Glass. I’m transitioning into cybersecurity, focusing on offensive security, based in Chicago. With a strong foundation in software development, I am actively expanding my skills through rigorous training in penetration testing and threat analysis.
Tools
Generate strong and secure passwords with my Random Password Generator.
Check the strength of your passwords with my Password Strength Tester.
Create cryptographic key pairs effortlessly using my Key Pair Generator.
Secure your messages with encryption and decryption capabilities using my Message Encryptor/Decryptor.
Explore different base conversions with my versatile Base Conversion Table.
Cybersecurity Projects
Explore my latest projects in cybersecurity where I delve into various aspects of offensive security, network defenses, and system hardening.
- Have I Been Pwned? Offline ProjectProject Overview: For my final project in the Northwestern Cybersecurity Bootcamp, I developed an offline version of the popular “Have I Been Pwned?” service. This tool allows users to check if their passwords have been compromised without needing an internet connection. Project Components: Docker Integration Database Management Automated Updates User Interaction Security and Efficiency This …
- Three-Day Cybersecurity ChallengeProject Overview: In an intensive three-day cybersecurity challenge, I engaged in a series of complex penetration tests across various platforms including web applications, Linux containers, and Windows systems. This multi-faceted challenge was designed to test and enhance my capabilities in identifying and exploiting vulnerabilities across different environments. Day 1: Web Application Vulnerability Exploitation I started …
- Web Application Penetration Testing ProjectProject Overview: In a series three days, I focused on identifying and exploiting vulnerabilities in web applications to enhance their security posture. These projects included a Web Application Penetration Testing exercise and a thrilling Capture the Flag (CTF) event, both designed to test and refine my skills in penetration testing, vulnerability analysis, and problem-solving. Objectives: …
- Azure Cloud Architecture Project: Secure Web Application DeploymentProject Overview: In this comprehensive project, I designed and implemented a secure, scalable web application architecture using Microsoft Azure. The architecture leveraged a jump box provisioner with Ansible for automated configuration management, ensuring efficient and consistent deployment of Docker containers across multiple web servers. Architecture Details: Security and Efficiency: This architecture not only ensured that …
Read more “Azure Cloud Architecture Project: Secure Web Application Deployment”
- Scavenger Hunt: A Cybersecurity AdventureProject Overview: Engaging in the scavenger hunt was an exhilarating experience that tested my cybersecurity problem-solving skills and penetration testing abilities. Each task was a puzzle that required ingenuity, patience, and a keen eye for detail, reflecting real-world scenarios that security professionals encounter. Discovering Hidden Files: The first task was to find hidden files containing …
Beyond Cybersecurity
Explore a diverse collection of my projects outside the realm of cybersecurity. This includes innovative iOS apps, unique web applications, and detailed insights into my mathematical research. Discover More →
Digital Defense Diary
- Completing My Cybersecurity Bootcamp Journey
The final four weeks of the Northwestern Cybersecurity Bootcamp have been incredibly enriching. We delved into detailed log analysis and integrated Splunk for SIEM, creating sophisticated alerts and visualizing cybersecurity data through dashboards. The highlight was my final project, “Have I Been Pwned? Offline,” which involved creating a Dockerized offline tool to check for compromised passwords. This project showcased my ability to build practical cybersecurity solutions, leveraging Python, Bash, and Docker. The bootcamp has transformed my understanding of cybersecurity, equipping me with both technical and strategic skills that I am eager to apply in a professional setting.
- Mastering Advanced Cybersecurity Tactics
Over the past four weeks at the Northwestern Cybersecurity Bootcamp, we’ve delved into advanced penetration testing and cybersecurity strategies. We mastered lateral movement and process migration within networks, pushing our skills by exploiting vulnerabilities in web applications, Linux, and Windows servers. We refined our analytical capabilities through in-depth log analysis and SIEM integration with Splunk, designing sophisticated alerts and correlation rules. We also focused on visualizing cybersecurity data, creating dashboards with geographical insights and differentiating advanced monitoring solutions like SOARs and UBAs. This month transformed my understanding of cybersecurity practices, sharpening both technical skills and strategic thinking in network defense.
- Diving into Offensive Security
The last month has been the most intense yet rewarding part of the cybersecurity bootcamp, focusing heavily on offensive security tactics and penetration testing. Learning to use Shodan for reconnaissance, understanding the intricacies of the MITRE attack framework, and practicing exploitation with Metasploit has transformed my theoretical knowledge into practical, actionable skills. This segment of the bootcamp has solidified my desire to specialize in offensive security, where I aim to proactively improve systems’ defenses by understanding and exploiting their weaknesses.
- Exploring Deeper Cybersecurity Waters
As I pass the three-month mark of the cybersecurity bootcamp, the intensity and depth of knowledge continue to grow. These past four weeks have introduced me to critical aspects of DHCP, NAT, and the intricacies of routing and packet analysis in network communications. Using tools like Aircrack-ng for network analysis and security testing has been particularly eye-opening. Each module has not only expanded my technical skills but also enhanced my analytical capabilities, preparing me for real-world security challenges.
- Advancing into Network and System Security
The second month at the cybersecurity bootcamp has been a whirlwind of learning and application, especially in network security and system defenses. From analyzing network packets with Wireshark to understanding IP address conversions and network topologies, I’ve gained invaluable insights into how data travels and can be secured. Practical sessions on managing Linux processes and auditing passwords using tools like ‘john’ have further equipped me with the skills to identify and fortify vulnerabilities within network systems.
- Foundations in Cybersecurity
Over the past four weeks, I’ve embarked on an enlightening journey into the fundamentals of cybersecurity. From mastering the basics of security strategies and tools to exploring the depths of the CIA triad, the initial phase of the Northwestern Cybersecurity Bootcamp has reshaped my understanding of this field. We delved into various types of cybersecurity attacks and how to mitigate risks effectively. The hands-on experience with command line basics and Linux file structures was particularly engaging, setting a solid groundwork for more complex challenges ahead.
- Joining Northwestern’s Cybersecurity Bootcamp
Excited to announce that I have joined the Northwestern Cybersecurity Bootcamp to deepen my knowledge in offensive security. This rigorous program covers everything from network security to advanced penetration testing. Stay tuned for updates on my journey!