Profile avatar

Jediah Jireh Naicker

Cyber Security Bootcamp Graduate

Cyber Security Bootcamp

Task Status Score
Task 1 - Cyber Crimes Completed 100
Task 2 - Governance, Compliance, and Roles Completed 100
Task 3 - Pseudocode Completed 100
Task 4 - Your First Computer Program, and Using Variables Completed 100
Task 5 - The String Data Type Completed 100
Task 6 - Numerical Data Types Completed 100
Task 7 - Control Structures - If, Elif, Else and the Boolean Data Type Completed 100
Task 8 - Logical Programming - Operators Completed 100
Task 9 - Capstone Project - Variables and Control Structures Completed 100
Task 10 - Control Structures - While Loop Completed 100
Task 11 - Control Structures - For Loop Completed 100
Task 12 - Defensive Programming - Error Handling Completed 100
Task 13 - String Handling Completed 100
Task 14 - Data Structures - The List Completed 100
Task 15 - IO Operations - Input Completed 100
Task 16 - IO Operations - Output Completed 100
Task 17 - Data Structures - Lists and Dictionaries Completed 100
Task 18 - Programming with Built-in Functions Completed 100
Task 19 - Programming with User-defined Functions Completed 100
Task 20 - Debugging - The Stack Trace Completed 100
Task 21 - Capstone Project - Lists, Functions, and String Handling Completed 100
Task 22 - Data Structures - 2D Lists Completed 100
Task 23 - Defensive Programming - Exception Handling Completed 100
Task 24 - OOP - Classes Completed 100
Task 25 - OOP - Inheritance Completed 100
Task 26 - Capstone Project - OOP Completed 100
Task Status Score
Task 1 - System Architecture Completed 100
Task 2 - Setting Up for Cyber Security - Kali Linux, HTTP, and SSH Completed 100
Task 3 - Cyber Security Tools - Linux Completed 100
Task 4 - Cyber Security Tools - Bash Scripting Completed 100
Task 5 - Cyber Security Tools - Cronjobs Completed 100
Task 6 - Web Development Overview Completed 100
Task 7 - HTML Overview Completed 100
Task 8 - Semantic HTML Completed 100
Task 9 - CSS Overview Completed 100
Task 10 - Introduction to Hashing Completed 100
Task 11 - PKI and Man-in-the-middle Attacks Completed 100
Task 12 - Capstone Project - Cyphers Completed 100
Task Status Score
Task 1 - XSS (Cross-Site Scripting) Vulnerability Completed 100
Task 2 - Databases Completed 100
Task 3 - Relational Databases Completed 100
Task 4 - SQL Completed 100
Task 5 - SQLite Completed 100
Task 6 - SQL Injection Completed 100
Task 7 - Capstone Project - Databases Completed 94
Task 8 - Server Security Completed 100
Task 9 - Logging Completed 100
Task 10 - Penetration Testing Completed 100
Task 11 - Digital Forensics Completed 100
Task 12 - Incident Response Completed 100
Task 13 - A Toolbox for Ethical Hacking Completed 100
Task 14 - Capstone Project - Case Study Completed 100
100 % Average grade

Your rank

Ranked 1 out of 19 students in their class