Skip to Content

Exploring Cybersecurity, IT & Artificial Intelligence


Where technology meets security and innovation.


Discover

Cybersecurity

Cybersecurity focuses on protecting systems, networks, and data from digital attacks.

On this platform, I will show some exanples. Such as :

  • Network Security Basics
  • Cryptography Fundamentals
  • Ethical Hacking Concepts
  • Risk Assessment

  • Cyber Threat Analysis

Information Technology (IT)

Information Technology is the backbone of modern digital infrastructure.

Topics include:

Operating Systems (Windows & Linux)


Networking Fundamentals


Cloud Computing Basics


Database Management


PROJECTS SECTION TEXT

This section highlights academic and practical projects I have developed to strengthen my technical knowledge.


First let me explain some basics.

Ports like 80, 443, and 22 are network communication endpoints.

They allow different types of internet traffic to go to the correct service on a server.

Think of it like this:

  • IP address = apartment building address
  • Port number = apartment number
  • Service (web, SSH, etc.) = the person inside




Port 80 — HTTP (Web Traffic)

Port 80 is used for HTTP (HyperText Transfer Protocol).

  • Used for normal websites
  • Data is not encrypted

When you visit a non-secure website, your browser connects to port 80.

⚠ Not secure — data can be intercepted.




Port 443 — HTTPS (Secure Web Traffic)

Port 443 is used for HTTPS (HTTP Secure).

  • Encrypted using SSL/TLS
  • Used for secure websites

When you see 🔒 in the browser address bar, it means port 443 is being used.

This is the standard for:

  • Online banking
  • Login systems
  • E-commerce
  • Social media



Port 22 — SSH (Secure Shell)

Port 22 is used for SSH.

SSH allows :

  • Secure remote login to a server
  • Command-line control of another computer
  • Secure file transfers (SFTP)





When useful?

Cybersecurity students use port 22 often when:

  • Managing Linux servers

  • Accessing cloud machines

  • Doing penetration testing labs




 

Why This Matters in Cybersecurity

When scanning a server using tools like Nmap:

  • Open 80/443 → Web server running

  • Open 22 → SSH access enabled

  • Misconfigured SSH → Possible security risk

Attackers look for open ports.

Defenders secure and monitor them.




FIRST PROJECT

Network Scanning Report – Localhost Analysis

Tool Used.

I performed a network scan using Nmap (Intense Scan Profile) to analyze open ports and services running on my local machine (127.0.0.1).



 Scan Results

  • Open Ports Found: 2

    • 135/tcp – MSRPC (Microsoft Remote Procedure Call)

    • 445/tcp – SMB (File Sharing Service)

  • 998 ports were closed

  • Operating System detected: Microsoft Windows

  • SMB Version: 3.1.1 (Message signing enabled)

Conclusion

The scan shows that only essential Windows services are running, and no unnecessary ports are exposed. SMB message signing is enabled, which improves security. Overall, the system appears properly configured with minimal network exposure.


SECOND PROJECT

Login System Security:

 Plain Passwords vs Hashed Passwords

When users create an account, their password should never be stored in plain text.

Plain Password Example (Insecure):

Username: student1
Password: mypassword123

If a hacker accesses the database, they can immediately see the password.

Hashed Password Example (Secure):

Username: student1
Password: 482c811da5d5b4bc6d497ffa98491e38

This encrypted value is called a hash.

Hashing uses algorithms like:

  • SHA-256

  • bcrypt

Why Hashing Matters

  • Protects user data

  • Prevents password leaks

  • Reduces impact of database breaches

  • Follows cybersecurity best practices

Conclusion: Secure systems always hash passwords before storing them.

THIRD PROJECT

AI-Based Intrusion Detection

Intrusion Detection Systems (IDS) monitor network traffic and detect suspicious behavior.

Traditional systems use rules.

AI systems use anomaly detection

 What is Anomaly Detection?

Anomaly detection means identifying activity that is unusual compared to normal behavior.

Example:

Normal traffic:

  • 50 login attempts per hour

  • 100 MB data transfer

Suspicious traffic:

  • 5,000 login attempts in 2 minutes

  • 10 GB data transfer suddenly

AI flags this as abnormal behavior.

for example

User Activity Analysis:

IP: 192.168.1.5
Login Attempts: 3
Status: Normal

IP: 203.45.77.12
Login Attempts: 450
Status: ⚠ Suspicious Activity Detected

Why AI is Important in Cybersecurity

  • Detects unknown attacks

  • Learns from behavior patterns

  • Reduces false alarms

  • Improves real-time security monitoring


CERTIFICATIONS SECTION

I continuously improve my technical skills through structured online courses and certifications in Cybersecurity, IT, and Artificial Intelligence. Which are from sources such as Coursera, Alison, HP life, Udemy

  • 1. Essentials of IT Service Management and İnfrastructure library level 4
  • 2. Artificial Intelligence : Preparing for the Future of Work
  • 3. Microsoft Excel 2019 Beginners
  • 4. Advanced features of Hadoop Ecosystem
  • 5. Data science & Analytics
  • 6. IT for business success
  • 7. Success mindset
  • 8. Effective leadership
  • 9. A deep dive into LLM Red Teaming
  • 10. Blue Team (Boot Camp) Defensive security essential training

  • 11. AI for Beginners

  • 12. Critical Thinking in the AI era

My long-term goal is to pursue a Bachelor's degree in Cybersecurity or Computer Science abroad, where I can gain advanced academic training, research exposure, and international experience.

I am particularly interested in combining cybersecurity with artificial intelligence to develop intelligent defense systems against modern cyber threats.

CONTACT SECTION

I am open to academic collaboration, student networking, and technology discussions.

Feel free to connect with me through email.