Daniel Durgaprasad
Professional Portfolio
Professional Portfolio
I am an IT professional with a specialized focus in cybersecurity, supported by formal training and industry‑recognized certifications. I am a graduate of Mohawk College’s Information Systems Specialist program, where I developed technical competencies across networking, operating systems, enterprise infrastructure, and secure computing environments. My academic foundation is reinforced by the CompTIA A+ – IT Technician certification and the Google Cybersecurity Professional Certificate, which validate my capabilities in endpoint support, system hardening, and security operations fundamentals.
My areas of expertise include technical support, system administration, and network support. I have hands‑on experience diagnosing and resolving hardware, software, and connectivity issues across Windows, macOS, Linux, and mobile platforms. I apply structured troubleshooting methodologies, configuration management principles, and best practices for maintaining secure, stable IT environments. Through my cybersecurity training, I gained practical exposure to threat identification, log analysis, vulnerability assessment, and the use of foundational SOC tools for monitoring and incident response.
I bring an analytical, detail‑driven approach to problem‑solving, with the ability to translate complex technical issues into clear, actionable solutions for users and stakeholders. My work style emphasizes reliability, documentation accuracy, and adherence to security standards. I thrive in environments where collaboration, continuous learning, and operational discipline are essential to protecting systems and data.
My goal is to contribute to an IT or security team where I can apply my technical expertise, expand my cybersecurity capabilities, and support the organization’s mission to maintain resilient, secure infrastructure.
Google Cybersecurity Professional Assignments Posted Below:
Assignments: 1. Analyze Network, 2. Network Traffic Analysis, 3. OS Hardening Techniques, 4. Analyze Network Attack, 5. Network Hardening
6. Risk Assessment Report, 7. NIST Cybersecurity Framework.
Assignments: 1. Investigate a suspicious file hash, 2. Use Cybersecurity Playbook.
Assignments: 1. Audit Overview, 2. Risk Assessment Report, 3. Controls Assessment,
4. Compliance Checklist, 5. Stakeholder Report.
Assignments: 1. Vulnerability Assessment, 2. NIST SP 800-30 Rev.1 Report.
Assignments: 1. Use Linux commands to manage file permissions.
Assignments: 1. Update a file using Python Programming Algorithm.
Assignments: 1. Apply Filters to SQL Queries.
Assignments: 1. Create Incident Handler's Journal.