Create apps that rate software

Yacht GPS software that is secure

Breach discovery

Ethical hacking

Redesigning a security system

Self-teaching and acquiring certifications

Evaluating security systems

Creating new defense techniques

Uninstalling vulnerable software

Reevaluating and restoring corrupted systems

Investigating and strengthening vulnerabilities

Tracking and monitoring for suspicious activity

YouTube teaching and awareness videos

Facebooktwitterlinkedininstagramflickrfoursquaremail