Currently studying Computer Science at the University of Ontario Institute of Technology (UOIT)
Experienced as an IT professional in networking and information security with a passion for software development.
My interests:
I have worked on dozens of projects so I have picked only the latest to showcase my skills and interests. More projects will be posted shortly.
Market-basket data originated with retail data, specifically grocery stores, where a market basket is a set of items purchased together. Task was to conduct market-basket analysis by developing the apriori algorithm. The goal was to find all frequent itemsets.
Standard brute force implementations can not handle large datasets due to memory usage. The goal of this project was to be able to process larger datasets. This project included 88162 transactions.
Key Features:
Code available upon request.
Task was to conduct market-basket analysis by developing the frequent itemsets algorithm. The goal was to find frequent pairs and triples of elements.
Standard brute force implementation was done in Python programming language for a movie dataset with 1382 transactions.
Key Features:
Code available upon request.
K-nearest-neighbors (KNN) is an algorithm that stores all available cases and classifies new cases based on a similarity measure.
I created a classifier for a Schoolkids dataset using k-nearest-neighbors (kNN), taking into account different features to predict student goals.
Key Features:
Code available upon request.
Independent coursework outside of undergrad
This 13.5 hour course prepares security practitioners to use Splunk Enterprise Security (ES). Use ES to identify and track security incidents, analyze security risks, use predictive analytics, and threat discovery.
Module 1 - Getting Started with ES
Module 2 - Security Monitoring and Incident Investigation
Module 3 - Investigation Timelines
Module 4 - Forensic Investigation with ES
Module 5 - Risk and Network Analysis
Module 6 - Web Intelligence
Module 7 - User Intelligence
Module 8 - Threat Intelligence
Module 9 - Protocol Intelligence
Module 10 - Glass Tables
This nine-hour course is designed for power users who want to create complex dashboards, forms, and visualizations. Its emphasis is on editing simple XML to create dashboards that use tokens, post-process searches, dynamic drilldowns, and custom stylesheets. Students also use custom JavaScript to add advanced visualizations and behaviors to dashboards.
Module 1 - Creating a Prototype
Module 2 - Using Tokens
Module 3 - Improving Performance
Module 4 - Customizing Dashboards
Module 5 - Using Event Handlers
Module 6 - Adding Advanced Visualizations & Behaviors
This 20-hour course prepares system administrators to configure and manage Splunk. Topics include installation, configuring data inputs and forwarders, data management, user accounts, licenses, and troubleshooting and monitoring. The focus in this class is the knowledge, best practices, and configuration details for Splunk administration in a medium to large distributed deployment environment.
Setting up a Splunk Enterprise Environment
Building a Basic Production Environment
Splunk Inputs
Parsing and Searching
Splunk Resource Management
This nine-hour course focuses on large enterprise deployments. Best practices for planning, data collection and sizing for a distributed deployment. Workshop-style labs challenge students to make design decisions about an example enterprise deployment.
Module 1 - Introduction
Module 2 - Initial Requirements Definition
Module 3 - Apps and Index Design
Module 4 - Infrastructure
Module 5 - Data Collection
Module 6 - Forwarders and Deployment Management
Module 7 - Data Comprehension and Enrichment
Module 8 - Search Considerations
Module 9 - Integration
Module 10 - Operations and Management
This course covers implementing analytics and data science projects using Splunk's statistics, machine learning, built-in and custom visualization capabilities.
Module 1 - Analytics Framework
Module 2 - Exploratory Data Analysis
Module 3 - Machine Learning Workflow
Module 4- Using Algorithms to Build Models
Module 5- Market Segmentation and Transactional Analysis
Module 6 - Anomaly Detection
Module 7 - Estimation and Prediction
Module 8 - Classification