Author Image

👋Hi, I am Akrem

  • I am a Developer FullStack

  • I am a Developer Python

  • I am a Junior Information Security Consultant in Pentesting

  • I love code, learn and share


👉I am a passionate 💻Software Developper and 🎓IT Former with more of 2 years of working experience in IT.
👉 I’m interested in CyberSecurity researcher in the field of computer science who's main focus is pentesting.
👉Analysing and sharing insight on new frontiers in information security, from my experience reporting on security vulnerabilities.
👉I am equipped with the ability to help you keep your data safe.
👉I have a good sense of communication and I particularly appreciate teamwork.
👉And I have been passionate about computers since I saw an Atari ST😻, ok it’s a bite long 👾👾👾

Initiative ☻
Team Work
Sense Of Responsibility²
Ηard Ɯorking
Sense Of Organization â—™
PrѺblem S☼lving

Skills

Front-end web development
Front-end Developer

I master the skills necessary to offer users a rewarding and user-friendly experience on the web as a front-end web developer. I learn everything I need to design and develop client-side code and learn how to bring concepts to the canvas of browsers by combining graphic design with coding principles.

Full Stack developer
Junior Full Stack Developer

Acquire the necessary skills allowing you to use both back-end and front-end technologies.This will give you a solid foundation for working with server and host setups, performing database integrations, and troubleshooting front-end development issues.

Junior Python Developer
Junior Python Developer

  • The basic concepts of programming and discover their usefulness.
  • The fundamentals of programming with Python.
  • Build and run a simple program with Python.

Ethical Hacker
Ethical Hacker

  • Network Security.
  • Security Operations.
  • Security Management.
  • Security Audit.
  • Security Policy
  • Security Engineering.
  • Security Consulting.

Ethical Hacking Essentials (EHE)
Ethical Hacking Essentials (EHE)

  • Fundamentals of information security and ethical hacking
  • Information security threats and vulnerabilities, types of malwares, and vulnerability assessments
  • Password cracking techniques, tools, and countermeasures
  • Social engineering concepts, its phases, techniques, and countermeasures
  • Network-level attacks including sniffing, denial-of-service, and session hijacking, and their countermeasures
  • Application-level attacks including webserver exploitation, OWASP top10 attacks, and SQL injection and their countermeasures
  • Wireless encryption, attacks, and countermeasures
  • Mobile, IoT, and OT attacks, and countermeasures
  • Cloud computing threats and countermeasures
  • Penetration testing fundamentals, its benefits, strategies, and phases

Git & GitHub
Git & GitHub

Experienced with git-based development. Mostly, use Github. Also, have experience in working with GitLab.

Experiences

1
Bucgrowd

Janvier.2022 - Present

Penetration Tester | Bug Bounty Hunter
Responsibilities:
  • Web Application Penetration Testing based on OWASP TOP 10.
  • Network Penetration Testing.
  • Proficient at web application/network security testing that could affect users in a dangerous way.
  • Able to diagnosis computer hardware and software problems.

IT security consultant
SCH

February.2021 – Present , Manouba | Tunisia

Responsibilities:
  • Acquire the basics of computer security.
  • Ensuring the security of a server.
  • Ensure the security of a Windows or Linux system and environment.
  • Master the security of a network and the configuration of a system.
  • Identify the weak points of the system and analyze the risks and dysfunctions.
  • Put in place appropriate security procedures and tools: password management, cryptology, antivirus, firewall, network access limitation.
  • Analyze the risks around the company's information system.
2

3
Next Release - you can read resume or contact me for info ;)
To be continued

September.2020 – January.2021, Manouba | Tunisia

a continuer plus tard

Responsibilities:

Education

License - Electrical Engineering | Automatism and Industrial Data Processing
Description
  • Mastery of technologies used in industrial systems
  • To be able to implement an industrial regulation chain
  • Broad skills, ability to understand all the technical aspects of a project, open-mindedness.
  • Validate the configuration of a network
  • Manage a system in real time
  • Ability to follow the technological evolution of his field of skills in the broad sense, which supposes the acquisition of the fundamentals and to tackle complex tasks.
Science in Information Technology “IT
Description
  • Training in Algorithmics, HTML, CSS, Javascript, PhP, MySQL.
  • Explain Network Technologies
  • Network Connectivity and Communications.