Hello, My name is Ali Kotb
I'm Cybersecurity Analyst
I'm a student in G11 In El-Sadat STEM School and I'm also a Cybersecurity Analyst and also ranked The Second place in DECI all over the government.
CertificatesAbout me
I'm Ali Kotb and Cybersecurity Analyst
I'm Ali Kotb, but you can call me Kotb. I'm a Cybersecurity Analyst, researcher, graphic designer, and a little bit web developer. I was enrolled in an Honors curriculum with a STEM emphasis at STEM El-Sadat High School for Boys.
To delve into uncharted realms of knowledge and receive support in my quest for learning, I aspire to attend a college that values its students and nurtures their academic and personal development.
Birthday:3 Mar 2007
Age:17
Website:alimohamed.me
Grade:G11 STEM El-Sadat
Phone:+201097444712
City :6 October City, Giza , Egypt
GPA:3.9
Computer skills
Web development
Cybersecurity
Writing
Listening
English
Arabic
German
Timeline of some of my achievements
16 May 2024
EF Standard English Test
I've got 67 From 100 (C1) Testing Reading, Writing, Listening, Speaking Click For Details
OCT 2021
TOFAS (Math Test) level 2
I've passed TOFAS level 2 with score 84% Click to View statistics
NOV 2023
TOFAS (Math Test) Level 5
I've passed TOFAS level 5 with score 83.3% Click to View statistics
Mar 2024
TOFAS (Math Test) Level 6 (The hardest level)
I've passed TOFAS level 6 with score 93.3% Click to View statistics
Education
2015 - 2023
Fifth Distinguished official school
I've atteneded in this school from G1 (Primary One) to G9 (3rd Preparatory)
2023 - 2026
STEM Sadat School for Boys
I will attend in this school from G10 (First Secondary) to G12 (3rd Secondary)
Projects
Caesar cipher
The Caesar cipher is a simple encryption technique where each
letter in a message is shifted by a fixed number of positions in the alphabet.
ㅤㅤㅤㅤ
integrity Checker
An integrity checker calculates a file's hash value and
compares it to a known, correct hash to verify that the file has not been
altered or corrupted.
This is important for checking if there is any sensitive or important data have
been edited by someone who is unauthorized to edit it.
ㅤㅤㅤㅤㅤㅤ
ㅤㅤㅤㅤ
Password Manager
A password manager is a secure tool that stores, organizes, and manages all your passwords in an encrypted vault. It allows you to access and use your passwords easily with just a single master password, ensuring strong security across all your accounts.
View ProjectCapstone project G10 Second Semester(Knocking For
Power)
This project was a creative Idea to Me and My Team which aims
to Generate electric energy From Kinetic Energy (From opening and closing the
door) which was the best Projects in our school.
ㅤㅤㅤㅤ
ㅤㅤㅤㅤ
password Strength Evaluator
A password strength evaluator analyzes a password's complexity and security by assessing factors like length, character variety, and patterns to determine its resistance to attacks.
View ProjectCybersecurity Analysis
As part of my cybersecurity analysis, I conducted a comprehensive malware scan, checked for any backdoors that could allow unauthorized access, utilized OPENVAS to identify vulnerabilities, and identified attacking open ports to prevent potential breaches. These efforts were essential in ensuring the security and integrity of the systems I was working on.
View ProjectGallery
Skills
Coder
I can deel with langauges like, Python, HTML , CSS, Javascript
Researcher
I have skills of searching and gathering trusted Informations
Graphic Designer
I made a lot of desings for my normal use and I have good skills in it
Adobe XD, Photoshop, Illustrator,Canva
3 years of experience using Adobe XD, Photoshop, Illustrator, and canva for designing and editing
Within more than 2 years of Experience I became able to Write PDFs with latex and with any kind of coding in it.
Ubuntu,Kali Linux, Parrot OS,....etc
I can deal with the terminal with a lot of commands and use other tools in the System
ㅤㅤㅤㅤ
Certificates
Second place in DECI
(Digital Egypt
Cubs
Initiative)
I Won the second place all over the government and the
first
place in the field of Cybersecurity from the minister Dr.Amr Talaat.
I also got an
opportunity to travel to USA for one week to visit Udacity company there.
DECI Level Three: Cybersecurity
I won this certificate after one year from attending
connect
sessions on zoom, attending physical Sessions, doing a lot of exams and pass
about two revoking texts, and submitting about two projects.
I learned
about
cybersecurity, Cyberdefence , ISO OSI Model, and social engineering. This
certificate was the first step for me in the field of Cybersecurity
ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ
Writing in the Sciences
(With Honors)
(From
Stanford)
This course opened the horizons for me in the field of
Writing
by providing me with:
1- How to make my writing interesting and remove any clutters from the
sentence.
3- more tips & advices from professors about writing scientific researches.
4- Writing a research and How to avoid plagiarism.
The Experiment Digital at World Learning
(distinguished achievement)
The Experiment Digital at World Learning is a virtual program that fosters cross-cultural understanding and leadership skills among youth through interactive online activities and discussions.
ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ
Play It Safe Manage Security Risks
The course typically covers the following learning
outcomes:
1-Identify security risks.
2-Assess and prioritize risks.
3-Apply security measures.
4-Respond to security incidents.
5-Understand compliance requirements.
6-Improve security practices.
Cybersecurity Fundamentals IBM
Cybersecurity Fundamentals IBM let me learn more about Cybersecurity.
CertificateExplore Emerging Tech
This course taught me the basics of key tech fields and how they are used in businesses, helping me explore tech careers.
CertificateCybersecurity Attack techniques
This course Teached me a lot about the attacking tools that the hacker use and the basics of Kali linux which is important for me to know what the hacker use to be able to defend against him
CertificateFoundations of Cybersecurity
I've learnt alot like:
1- Understanding Cybersecurity Basics: Learn fundamental concepts, including
the importance of cybersecurity and the role it plays in protecting data and
systems.
2- Risk Management
3- Threats and Vulnerabilities.
4- Security Tools and Best Practices.
5- Introduction to Compliance.
6- Hands-on Experience.
Introduction to Cybersecurity
I learnt in this course more about attack treats and how it can affect the normal user. and what companies do to protect themselves from any treats.ㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤㅤ
Certificate