l My Portfolio
Coding

Hello, I'm Brandon Helfrich.
Aspiring Cybersecurity Engineer

I am a recent college graduate with my degree in Cybersecurity, currently studying for CompTIA Security+.

About Metimeline

Who is Brandon Helfrich?

I recently graduated from Southeast Missouri State University, majoring in cybersecurity and minoring in computer science. I am experienced with Linux and curently looking to pursue a career in cloud computing/security and actively looking to learn new things.

I like to sharpen my coding skills with consistent mini projects and learn important concepts every day using online platforms such as TryHackMe and HackTheBox. This learning journey has become an amazing hobby in itself. I am currently studying for the CompTIA Security+ certification.

Learning on TryHackMe

Virtual
Home Labs

Consistent Coding Practice

Providing Learning Platforms

Related Experience

2019 - 2023

Student - Southeast Missouri State University

I majored in Cybersecurity and minoring in Computer Science. My hope from my degree is to build a foundational understanding in network security while using those skills to learn more on my own.

2023- present

ITAM Intern -World Wide Technology

Perform responsibilities including laptop imaging, hardware maintenance, asset recovery, and hardware disposal. Assist company employees by fulfilling hardware needs via ServiceNow tickets. Create knowledge base articles by creating documentation for work processes. Complete multiple projects in a timely manner.

2022 - 2023

Tier 1 Support Technician - Big River Communications

I provided support to Big River & Circle Fiber customers via phone, email, and the ticketing system, for most issues related to telephone and internet services.

2022 - 2023

Linux Specialist - Collegiate Cyber Defense Team

Set up & hardened Linux environment for competition setting. Monitored & responded to attacks and vulnerabilities. Worked in a team environment to maintain our system.

My PortfolioMy Work

Get an inside look on some of the stuff that I've been working on.

Pi-Hole DNS Server

Project Source

Python Adventure Game

Project Source

Python Password Generator

Project Source

First Cybersecurity Homelab

Project Source

Raspberry Pi Small Offensive Lab

Project Source

The BlogMy Posts

Intro to Amazon Web Services (AWS)

AWS is a comprehensive, evolving cloud computing platform provided by Amazon that includes a mixture of infrastructure as a service (IaaS), platform as a service (PaaS) and packaged software as a service (SaaS) offerings. AWS services can offer an organization tools such as compute power, database storage and content delivery services.

What is Active Directory?

Active Directory is the directory service for Windows Domain Networks. It is a collection of machines and servers connected inside of domains, that are a collective part of a bigger forest of domains, that make up the Active Directory network. Active Directory contains many functioning bits and pieces and is important to understand for those getting into I.T. In this post, I will cover a few components and become fimilar with the various pieces of Active Directory.

Symbiote Malware

I recently came across an interesting post on LinkedIn covering a stealthy Linux threat that is targeting financial insitutions in Latin America. The title of the article flashed "New Linux malware 'almost impossible' to detect," with researchers dubbing the threat "Symbiote" because of its parasitic nature. Of course, the Marvel fanboy in me was instantly intrigued by the name of the newfound threat.

Honeypots

A honeypot is a security mechanism that creates a virtual trap to lure attackers. An intentionally compromised computer system allows attackers to exploit vulnerabilities so you can study them to improve your security policies. You can apply a honeypot to any computing resource from software and networks to file servers and routers.

What is Docker?

If you plan on going into cloud computing, heck even any I.T. role for that matter, you just have to know what a docker container is and what it does. What is a docker container? Well, before we can define what a docker container actually is, we first have to understand what it is replacing.

Phishing Attacks

Phishing is an example of social engineering with a touch of spoofing. It is where an attacker sends a fraudulent message designed to trick a victim into falling for a scam. This typically involves stealing financial credentials or other sensitive information. Those who fall for these scams may end up with malware, most commonly ransomware, identity theft, or data loss.

Six Phases of Incedent Response

Cybersecurity is a field that is important to pretty much every industry. A good cybersecurity system can help businesses stay safe from cybercrimes such as phishing attacks, malware attacks, and ransomware. Any organization that is serious about its cybersecurity should start with a good incident response plan.

How Does Malware Work?

The term malware refers to harmful software that may disrupt or manipulate a computer’s normal operations. Malware can infect any device that has computing capabilities; phones, tablets, personal PCs, company equipment, etc.

Contact MeMy Blogs

How To Reach Me

Feel free to reach out with project ideas or other inquiries. I can best be reached by email or on LinkedIn.

Location

: Missouri, United States

Email

: bran.helfrich@gmail.com

Mobile Number

: 314-704-8504