Security projects

Phishing Email Awareness
I go through 2 different categories on how to spot phishing attacks. Covered topics:
- Common mistakes and baits
- Used of personal email in professional settings
- Root domains
- Reply to field
- Signed by field
Nmap and WireShark
Using both Nmap and Wireshark to find vulnerability on a environment with active directory domain controller, windows machines, and Linux vms.
