top of page

About Me.

Hello, I'm Braden Greenwell, a lifelong resident of Arizona and soon-to-be graduate in network security. My journey has been fueled by a profound passion for technology, which has led me to explore various avenues within the field. In my free time, I enjoy refurbishing laptops, finding joy in breathing new life into old devices. I thrive on learning, constantly seeking out new knowledge and skills to add to my arsenal. I firmly believe in seizing every opportunity that comes my way, leveraging them to propel myself forward. My ultimate objectives revolve around gaining valuable experience and ultimately ascending to the role of a network specialist, where I can apply my expertise to safeguard digital infrastructures and networks.

University of Advancing Technology 

 

  • BS:  Network Security  2021-2024 

 

  • CompTIA A+ Certification

  • CompTIA Security + Certification

Skills

Shell

Linux Shell 

Power Shell

Command Prompt

Registry Editor

Programming

HTML

JavaScript

CSS

Python

Digital Forensics

Disk Imaging

Cryptography

Hashing

Others

Microsoft Office

Domains

Researching

Customer Service

1. Create a network infrastructure design communications document that includes identified hardware components, connections to the outside world, identified physical layer connectivity (media) and addressing, including operational and security components in the design.

2. Install, configure and test security hardware and software tools with supporting documentation such as port scanners, vulnerability detection systems, intrusion detection systems, firewalls, system hardening, anti-virus tools, patch management, auditing and assessment.

3. Construct, implement and document a script or a program to automate a security-related process or other tasks such as installation, administration, management, mapping resources, logon scripts, patch management, updates, auditing, analysis and assessment.

4. Create a policy or procedure that addresses events such as: a disaster recovery plan, a business continuity plan, an incident response policy, an acceptable usage document, an information security policy, a physical security policy, assessments or troubleshooting procedures.

5. Develop a research report or implementation plan concerning legal and ethical best practices and mandated requirements that pertain to information security.

6. Research, document, test and evaluate several current industry information security-based threats, risks, malicious activities, covert methodology, encryption technologies, mitigation techniques or unconventional tactics to prevent loss of sensitive information and data confidentiality, integrity and availability.

Projects

Location

Gilbert, Arizona 

Phone

(123)-456-7890

Email

Connect

  • Facebook
  • Twitter
  • LinkedIn
  • Instagram
bottom of page