Skip to content
View kemiscut's full-sized avatar
🏠
Working from home
🏠
Working from home

Block or report kemiscut

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
kemiscut/README.md

Hi 👋, I'm Aishat Alli

An information security specialist

Coding

kemi_alli

  • 🔭 I’m currently working on ISMS Implementation

  • 🌱 I’m currently learning Terraform

  • 👯 I’m looking to collaborate on LinkedIn

  • 🤝 I’m looking for help with Job Opportunities

  • 👨‍💻 All of my projects are available at github/kemiscut

  • 📝 I regularly write articles on [Microsoft Purview](Microsoft Purview)

  • 💬 Ask me about Cybersecurity

  • 📫 How to reach me kemiscut@gmail.com

  • 📄 Know about my experiences https://bit.ly/3Uj2DOf

  • ⚡ Fun fact I love watching korean movies

Connect with me:

kemi_alli aishat alli aishat alli

Languages and Tools:

css3 figma git html5 mssql mysql postgresql sqlite

kemiscut

 kemiscut

Pinned Loading

  1. Risk-Assessment-for-Acme-s-Application-Upgrade Risk-Assessment-for-Acme-s-Application-Upgrade Public

    This is a fictitious case study designed to showcase my expertise in performing risk assessments in the context of financial services. The scenario involves Acme Financial Services, a financial ins…

  2. hashicorp-certified-terraform-associate-on-azure hashicorp-certified-terraform-associate-on-azure Public

    Forked from stacksimplify/hashicorp-certified-terraform-associate-on-azure

    HashiCorp Certified Terraform Associate on Azure Cloud

    HCL

  3. Brute-Force-Attack-Playbook Brute-Force-Attack-Playbook Public

    This playbook outlines the step-by-step process for detecting, mitigating, and responding to brute force attacks targeting Acme’s mobile banking application.

  4. Acme-s-DLP-Policy-Documentation Acme-s-DLP-Policy-Documentation Public

    This document outlines the implementation of Acme’s Data Loss Prevention (DLP) policy using Microsoft Purview to protect sensitive financial, customer, and corporate information from unauthorized a…

  5. Acme-s-Access-Control-Policy Acme-s-Access-Control-Policy Public

  6. Information-Security-Policy Information-Security-Policy Public