Information Security
Information Security Work
Each of the documents below show some of the different areas of information security that I studied. The documents below are primarily focused on issues relating to database security. Some of my other work relating to Information Security contains potentially sensitive company information and thus is not provided.

Pen Testing

Data Encryption

Active Directory and Group Policy Objects

SQLi
