[go: up one dir, main page]
More Web Proxy on the site http://driver.im/
Skip to content

ingochris/resume

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

GENERAL BIO 📑

LinkedIn: https://linkedin.com/in/ingochris

Resume: https://www.ingochris.tech/resume

Website: https://ingochris.tech

Christopher is a software engineer who entered the tech scene through the hair-raising vector of penetration testing.

It is his goal to build a cybersecurity career from this exciting childhood interest, so he can orchestrate best-practice catalysts and save the world from Black-Hats.

In recent years, Christopher has leveraged his free time to become an experienced hackathon hacker (60+ competitions) and organizer (HackingEDU | SiliconHacks | Spectra), exercising his passion to educate, invent, and share. Christopher currently studies the triple threat of Computer Science, Information Security, and Latin Ballroom Dance.

SECTION TITLE AUTHORITY 📑
CCNARS1 CCNA R&S: Introduction to Networking Cisco Network Academy ✔️
CCNARS2 CCNA R&S: Routing & Switching Essentials Cisco Network Academy ✔️
CCNACY1 CCNA Cybersecurity Fundamentals Cisco Network Academy ✔️
CCNACY2 CCNA Cybersecurity Operations Cisco Network Academy ✔️
CIS037A C Programming Mission College ✔️
CIS045 Linux Essentials Mission College ✔️
CIS046 Shell Programming Mission College ✔️
CIS047 Linux System Administration Mission College ✔️
CIT012 Computer Networks Mission College ✔️
CIT016 IT Security and Ethical Hacking Mission College ✔️
CIT021 Cisco Network Fundamentals (Cisco-1) Mission College ✔️
CIT022 Routing Protocols and Concepts (Cisco-2) Mission College ✔️
CS50X Computer Science 50 Harvard University
CS101 Principles of Computing Stanford University ✔️
XCS100 Introduction to Web Security Stanford University
CS101SP Introduction to Computer Science in JavaScript Stanford University ✔️
CS001U Practical UNIX Stanford University ✔️
CS106A Programming Methodology in Java Stanford University ✔️
CS106B Programming Abstraction in C++ Stanford University
CS107 Programming Paradigms in C Stanford University
CS142 Web Applications Stanford University
CS143 Compilers Stanford University
CS144 Computer Networks Stanford University
CSDB01 Data Models: Introduction and Relational Databases Stanford University ✔️
CSDB02 Data Models: XML Data Stanford University ✔️
CSDB03 Data Models: JSON Data Stanford University ✔️
CSDB04 Relational Databases: Relational Algebra Stanford University
CSDB05 Relational Databases: SQL Stanford University ✔️
CSDB06 XML Databases: XPath and XQuery Stanford University ✔️
CSDB07 XML Databases: XSLT Stanford University ✔️
CSDB08 Database Design: Relational Design Theory Stanford University
CSDB09 Database Design: Unified Modeling Language Stanford University ✔️
CSDB10 SQL Advanced Features: Indexes and Transactions Stanford University ✔️
CSDB11 SQL Advanced Features: Constraints and Triggers Stanford University
CSDB12 SQL Advanced Features: View and Authorization Stanford University
CSDB13 SQL Advanced Features: On-Line Analytical Processing Stanford University ✔️
CSDB14 SQL Advanced Features: Recursion in SQL Stanford University ✔️
CS147 Human Computer Interaction Design Stanford University ✔️
CS154 Automata and Complexity Theory Stanford University
CS161 Algorithms: Design and Analysis Stanford University ✔️
CS223A Robotics Stanford University
CS228 Probabilistic Graphical Models Stanford University
CS229 Machine Learning Stanford University
CS231n Convolutional Neural Networks Stanford University
CS236 Mining Massive Datasets Stanford University
CS255 Cryptography Stanford University
STAT216 Statistical Learning in R Stanford University ✔️
CY501 Cybersecurity Fundamentals Rochester Institute of Technology ✔️
CY502 Computer Forensics Rochester Institute of Technology ✔️
CY503 Cybersecurity Risk Management Rochester Institute of Technology ✔️
CY504 Network Security Rochester Institute of Technology ✔️
CY525 Cybersecurity Capstone Rochester Institute of Technology
CY601 Research Methods and Proposal Development Rochester Institute of Technology
CY603 Enterprise Security Rochester Institute of Technology
CY604 Cryptography and Authentication Rochester Institute of Technology
CY742 Computer System Security Rochester Institute of Technology
CY731 Web Server and Application Security Audits Rochester Institute of Technology
CY743 Computer Viruses and Malicious Software Rochester Institute of Technology
CY793 Capstone for Computing Security Rochester Institute of Technology
CY1000 CompTIA A+ CybraryIT ✔️
CY1001 CompTIA Cloud+ CybraryIT ✔️
CY1002 Cryptography CybraryIT ✔️
CY1003 HIPAA Training CybraryIT ✔️
CY1006 ITIL Foundation CybraryIT ✔️
CY1007 CompTIA Linux+ CybraryIT ✔️
CY1009 CompTIA Security+ CybraryIT ✔️
CY2000 CCNA CybraryIT
CY2001 Computer and Hacking Forensics (CHFI) CybraryIT ✔️
CY2004 COBIT CybraryIT ✔️
CY2008 Microsoft SharePoint CybraryIT ✔️
CY2009 Penetration Testing and Ethical Hacking CybraryIT
CY2016 Web Application Penetration Testing CybraryIT
CY3005 Malware Analysis and Reverse Engineering CybraryIT
CY3006 Metasploit CybraryIT ✔️
CY3007 PCI/DSS CybraryIT ✔️
CY3011 Corporate Cybersecurity Management CybraryIT ✔️
CYPAFW Palo Alto Networks Firewalls CybraryIT ✔️
M101P MongoDB Python Development MongoDB University ✔️
AZ900 Microsoft Certified Azure Fundamentals Microsoft
AZ104 Microsoft Certified Azure Administrator Associate Microsoft
AZ204 Microsoft Certified Azure Developer Associate Microsoft
AZ305 Microsoft Certified Azure Solutions Architect Expert Microsoft
AZ400 Microsoft Certified Azure Devops Engineer Expert Microsoft
AZ500 Microsoft Certified Azure Security Engineer Associate Microsoft
AI900 Microsoft Certified Azure Artifical Intelligence Fundamentals Microsoft
DP900 Microsoft Certified Azure Data Fundamentals Microsoft
DP100 Microsoft Certified Azure Data Scientist Microsoft
PL900 Microsoft Security Operations Analyst Microsoft
SC200 Microsoft Power Platform (PowerBI) Fundamentals Microsoft
SC300 Microsoft Identity and Access Administrator Microsoft
SC400 Microsoft Information Protection Administrator Microsoft
MLKQL MustLearnKQL Certificate Microsoft ✔️
MCAS Microsoft Cloud App Security Ninja (MCAS) Microsoft
MDEN Microsoft Defender for Endpoint Ninja (MDE) Microsoft
MDIN Microsoft Defender for Identity Ninja (MDI) Microsoft
MDON Microsoft Defender for Office 365 Ninja (MDO) Microsoft
MSN Microsoft Sentinel Ninja Microsoft ✔️
OSKLR Kali Linux Revealed Offensive Security ✔️
OSMSFU Metasploit Framework Unleashed Offensive Security ✔️
OSPWK Penetration Testing with Kali Linux Offensive Security
OSWiFu Offensive Security Wireless Attacks Offensive Security
OSCTP Cracking The Perimeter Offensive Security
OSAWE Advanced Windows Exploitation Offensive Security
OSAWAE Advanced Web Attacks and Exploitation Offensive Security
OST001 Android Forensics & Security Testing Open Security Training
OST003 Flow Analysis & Network Hunting Open Security Training
OST004 Hacking Techniques and Intrusion Detection Open Security Training
OST005 Intel x86: Architecture, Assembly, Applications Open Security Training
OST006 Intel x86-64: Architecture, Assembly, Applications Open Security Training
OST007 Introduction to ARM Open Security Training
OST008 Introduction to Cellular Security Open Security Training ✔️
OST009 Introduction to Network Forensics Open Security Training ✔️
OST010 Introduction to Secure Coding Open Security Training
OST011 Introduction to Vulnerability Assessment Open Security Training
OST012 Introduction to Trusted Computing Open Security Training
OST013 Offensive, Defensive, and Forensic Web User Identification Open Security Training ✔️
OST014 Pcap Analysis & Network Hunting Open Security Training
OST015 Malware Dynamic Analysis Open Security Training
OST016 Secure Code Review Open Security Training
OST017 Smart Cards Open Security Training
OST018 The Life of Binaries Open Security Training
OST019 Understanding Cryptology: Core Concepts Open Security Training
OST020 Understanding Cryptology: Cryptanalysis Open Security Training
OST021 Introduction to Software Exploits (Exploits 1) Open Security Training
OST022 Exploits 2: Exploitation in the Windows Environment Open Security Training
OST023 Intermediate Intel x86: Architecture, Assembly, Applications Open Security Training
OST024 Advanced x86: Virtualization with Intel VT-x Open Security Training
OST025 Advanced x86: Introduction to BIOS & SM Open Security Training
OST026 Introduction to Reverse Engineering Software Open Security Training
OST027 Reverse Engineering Malware Open Security Training
OST028 Rootkits: What they are, and how to find them Open Security Training
OST029 An in-depth look into keylogging on Windows Open Security Training
SL1014 HTML5 SoloLearn ✔️
SL1024 JavaScript SoloLearn ✔️
SL1051 C++ SoloLearn
SL1059 PHP SoloLearn ✔️
SL1060 SQL SoloLearn ✔️
SL1068 Java SoloLearn ✔️
SL1073 Python 3 SoloLearn ✔️
SL1081 Ruby SoloLearn ✔️
UDACITY Android Basics Nanodegree Udacity
UDACITY Android Developer Nanodegree Udacity
VMEDU Scrum Fundamentals Certified (SFC™) certification ScrumStudy ✔️

Releases

No releases published

Packages

No packages published

Languages