Hello, I'm
Andrews Boateng Okyere
Junior Cybersecurity Professional
A cybersecurity professional with a specialization in API security and a strong foundation in networking, web applications, Governance, risk and compliance. I mostly work on auditing and securing API's

get in touch
3+
years of experience
3%
tryhackme
100+
hands on labs
hands on labs
I continuously build solid theoretical knowledge and practical skills in the field from reputable sources in the industry such as TryHackMe, HackTheBox, EC-Council, ISC2, Cybrary, etc
TryHackMe
Hands-on cyber security training through real-world scenarios with about 4,485,345 users worldwide.
rank
48,241
Completed Rooms
87
Badges
17

Advent of Cyber 2022
Get started with Cyber Security in 24 Days - learn the basics by doing a new, beginner-friendly security challenge every day leading up to Christmas.
{ "id": "664f23287fa73599935ec635", "weight": 5 }{ "id": "664f23287fa73599935ec5c5", "weight": 4 }{ "id": "664f23287fa73599935ec5be", "weight": 3 }{ "id": "664f23287fa73599935ec5b3", "weight": 3 }{ "id": "664f23287fa73599935ec5b6", "weight": 3 }{ "id": "664f2382b38132f571cfe2e1", "weight": 3 }{ "id": "664f23287fa73599935ec5e4", "weight": 3 }{ "id": "664f23287fa73599935ec5e8", "weight": 2 }{ "id": "664f23287fa73599935ec5ee", "weight": 1 }{ "id": "664f23287fa73599935ec61b", "weight": 1 }{ "id": "664f23287fa73599935ec5da", "weight": 1 }{ "id": "664f23287fa73599935ec5ce", "weight": 5 }{ "id": "664f23287fa73599935ec5cf", "weight": 5 }{ "id": "664f23287fa73599935ec5d7", "weight": 5 }
Diamond Model
Learn about the four core features of the Diamond Model of Intrusion Analysis: adversary, infrastructure, capability, and victim.
{ "id": "664f23287fa73599935ec633", "weight": 5 }{ "id": "664f23287fa73599935ec5af", "weight": 5 }{ "id": "664f23287fa73599935ec5b3", "weight": 5 }Active Directory Basics
This room will introduce the basic concepts and functionality provided by Active Directory.
{ "id": "664f23287fa73599935ec634", "weight": 5 }{ "id": "664f23287fa73599935ec5c5", "weight": 5 }{ "id": "664f23cbb38132f571d057d5", "weight": 3 }{ "id": "664f2382b38132f571cfe2e1", "weight": 2 }{ "id": "6703b38a6d6e431e84472e57", "weight": 3 }{ "id": "664f23287fa73599935ec5ce", "weight": 5 }{ "id": "664f237fb38132f571cfdd1f", "weight": 5 }Careers in Cyber
Learn about the different careers in cyber security.
{ "id": "664f23287fa73599935ec633", "weight": 5 }{ "id": "664f23287fa73599935ec5b2", "weight": 4 }{ "id": "664f23287fa73599935ec5b4", "weight": 4 }{ "id": "664f23287fa73599935ec5b8", "weight": 4 }{ "id": "664f23287fa73599935ec5c4", "weight": 4 }{ "id": "664f23287fa73599935ec5b5", "weight": 4 }{ "id": "664f23287fa73599935ec5e1", "weight": 4 }{ "id": "664f23287fa73599935ec5da", "weight": 4 }{ "id": "664f23287fa73599935ec5e8", "weight": 4 }{ "id": "664f23287fa73599935ec5cf", "weight": 5 }