Hello, I'm

Andrews Boateng Okyere

Junior Cybersecurity Professional

A cybersecurity professional with a specialization in API security and a strong foundation in networking, web applications, Governance, risk and compliance. I mostly work on auditing and securing API's

Andrews Boateng Okyere - Cybersecurity professional

get in touch

3+

years of experience

3%

tryhackme

100+

hands on labs

hands on labs

I continuously build solid theoretical knowledge and practical skills in the field from reputable sources in the industry such as TryHackMe, HackTheBox, EC-Council, ISC2, Cybrary, etc

Try Hack Me TryHackMe

Hands-on cyber security training through real-world scenarios with about 4,491,046 users worldwide.

rank

48,284

Completed Rooms

87

Badges

17

Advent of Cyber 2022

Advent of Cyber 2022

Get started with Cyber Security in 24 Days - learn the basics by doing a new, beginner-friendly security challenge every day leading up to Christmas.

{ "id": "664f23287fa73599935ec635", "weight": 5 }{ "id": "664f23287fa73599935ec5c5", "weight": 4 }{ "id": "664f23287fa73599935ec5be", "weight": 3 }{ "id": "664f23287fa73599935ec5b3", "weight": 3 }{ "id": "664f23287fa73599935ec5b6", "weight": 3 }{ "id": "664f2382b38132f571cfe2e1", "weight": 3 }{ "id": "664f23287fa73599935ec5e4", "weight": 3 }{ "id": "664f23287fa73599935ec5e8", "weight": 2 }{ "id": "664f23287fa73599935ec5ee", "weight": 1 }{ "id": "664f23287fa73599935ec61b", "weight": 1 }{ "id": "664f23287fa73599935ec5da", "weight": 1 }{ "id": "664f23287fa73599935ec5ce", "weight": 5 }{ "id": "664f23287fa73599935ec5cf", "weight": 5 }{ "id": "664f23287fa73599935ec5d7", "weight": 5 }
Diamond Model

Diamond Model

Learn about the four core features of the Diamond Model of Intrusion Analysis: adversary, infrastructure, capability, and victim.

{ "id": "664f23287fa73599935ec633", "weight": 5 }{ "id": "664f23287fa73599935ec5af", "weight": 5 }{ "id": "664f23287fa73599935ec5b3", "weight": 5 }
Active Directory Basics

Active Directory Basics

This room will introduce the basic concepts and functionality provided by Active Directory.

{ "id": "664f23287fa73599935ec634", "weight": 5 }{ "id": "664f23287fa73599935ec5c5", "weight": 5 }{ "id": "664f23cbb38132f571d057d5", "weight": 3 }{ "id": "664f2382b38132f571cfe2e1", "weight": 2 }{ "id": "6703b38a6d6e431e84472e57", "weight": 3 }{ "id": "664f23287fa73599935ec5ce", "weight": 5 }{ "id": "664f237fb38132f571cfdd1f", "weight": 5 }
Careers in Cyber

Careers in Cyber

Learn about the different careers in cyber security.

{ "id": "664f23287fa73599935ec633", "weight": 5 }{ "id": "664f23287fa73599935ec5b2", "weight": 4 }{ "id": "664f23287fa73599935ec5b4", "weight": 4 }{ "id": "664f23287fa73599935ec5b8", "weight": 4 }{ "id": "664f23287fa73599935ec5c4", "weight": 4 }{ "id": "664f23287fa73599935ec5b5", "weight": 4 }{ "id": "664f23287fa73599935ec5e1", "weight": 4 }{ "id": "664f23287fa73599935ec5da", "weight": 4 }{ "id": "664f23287fa73599935ec5e8", "weight": 4 }{ "id": "664f23287fa73599935ec5cf", "weight": 5 }
cyb ndy
© 2023 Designed & Developed by Cybandy