Profiles

Personality

Type
Assertive Defender

Your personality type shows what guides your attitudes and actions in life.

Code
ISFJ-A

The letters in your type code refer to your five dominant traits: Introverted (I), Observant (S), Feeling (F), Judging (J), and Assertive (-A).

Role
Sentinel

Your Role determines your goals, interests and preferred activities.

Strategy
Confident Individualism

Your Strategy determines how you approach everyday situations and achieve your goals.

Mind

29% Extraverted
71% Introverted

This trait determines how we interact with our environment.

Energy

38% Intuitive
62% Observant

This trait shows where we direct our mental energy.

Nature

47% Thinking
53% Feeling

This trait determines how we make decisions and cope with emotions.

Tactics

69% Judging
31% Prospecting

This trait reflects our approach to work, planning and decision-making.

Identity

71% Assertive
29% Turbulent

This trait underpins all others, showing how confident we are in our abilities and decisions.

NERIS Type Explorer® by: 16personalities.com

Inner drivers

Be perfect!

People with this driver have to do everything especially thoroughly. Perfection is the main goal, no matter what the cost. Because they work flawlessly, they hope for recognition. They are often in the process of justifying themselves. And mention concerns and possible criticism in advance.

41 / 50

Be strong!

Get it right!

People with this driver have learned not to show weakness. They convey a controlled attitude, assertiveness and perseverance to the outside world. At the same time, they hide their feelings and appear reserved to stoic.

People with this "do it right" driver like to feel responsible for others. They want the other person to feel good and are primarily concerned with the question of what the other person might want and what might be good for him.

36 / 50
34 / 50

Hurry up!

Make an effort!

People with this driver are never really present. They always have to do everything immediately and quickly, preferably, several things at the same time. They are always in a hurry, sitting there quietly, doing nothing is just as impossible as concentrated work.

People with this driver know: Anyone who works so hard is conscientious and diligent. But they are also under a lot of pressure to perform. Successes that are not based on hard effort don't count. If something doesn't work out, they have to work even harder. They live in constant fear that others could be better. The only thing that helps is even more effort.

32 / 50
31 / 50
Moving People Test: lauraburckhardt.de

Values

  • Respect

  • Honesty

  • Prudence

  • Self discipline

  • Purposefulness

  • Responsibility

  • Agility

  • Sharing

  • Harmony

  • Health

Certifications

Scrum Foundation

Scrum Foundation

EXIN Agile Scrum Foundation offers professionals a unique certification that combines agile service management techniques and scrum development frameworks. Candidate's are tested on their understanding of key concepts and their application.

Scrum Master

Scrum Master

The EXIN Agile Scrum Master is a unique certification that combines agile methodologies and scrum practices with practical assignments. It tests the competences required to facilitate, coach and enable a cross-functional team as a Scrum Master.

PRINCE2 Foundation

PRINCE2 Foundation

The Foundation certification aims to confirm that you know and understand the PRINCE2 method well enough to be able to work effectively with, or as a member of, a project management team working within an environment supporting PRINCE2.

Projekt- und Qualitätsmanagement

Sie lernen die Grundlagen für ein effizientes Projekt- und Qualitätsmanagement kennen, wie bspw. Tools und Techniken für die Projekt- und Leistungsplanung, das Stakeholder- und Risikomanagement u. a., und erlangen das nötige Basiswissen zur Planung, Steuerung und Optimierung von Prozessen in Unternehmen.

Kommunikation und Konfliktmanagement

In diesem Kurs erwerben Sie das nötige Praxiswissen für eine angemessene und zielorientierte Kommunikation. Sie lernen Gesprächs- und Verhandlungstechniken sowie Methoden zur Konfliktlösung kennen und anzuwenden, um auch in schwierigen Situationen den Projekt- bzw. Unternehmenserfolg sicherzustellen.

Bootstrap Themes

The Bootcamp Project

The bootcamp project, should accompany my way, in the complex world of information technology, not to lose sight of the goals.

Here you can find, all my current subprojects and collections of other interesting public projects.

Programming Courses

Python Core

Python Core
by sololearn.com

Learn Python, one of today's most in-demand programming languages on-the-go! Practice writing Python code, collect points, & show off your skills now!

  • Functions & Modules
  • Exceptions & Files
  • Functional / Object oriented Programming
  • Regular Expressions
  • Pythonicness & Packaging

Python Data Structures

Python Data Structures
by sololearn.com

In this course, we will learn about different Python Data Structures such as strings, lists, dictionaries, tuples, sets, and much more.

  • Working with Strings
  • Lists
  • Tuples
  • Sets
  • User-Defined Data Structures

Python for Beginners

Python for Beginners
by sololearn.com

In this course, we’ll cover the basic concepts of Python, as well as build real-life projects and solve different coding challenges.

  • Basic Concepts
  • Variables
  • Control Flow
  • Lists
  • Functions

Java Fundamentals

Java
by w3schools.com

Start learning Java with the w3schools fundamentals course. Java is a programming language used to develop mobile apps, web apps, desktop apps, games and much more.

  • Conditions, Loops and Arrays
  • Methods
  • Classes and Objects
  • Class Features, User Input, Date and Time
  • Packages
  • File Handling

Java Fundamentals

Java Fundamentals
by sololearn.com

You’ll learn object-oriented Java programming and have the ability to write clear and valid code.

  • Basic Concepts
  • Conditionals and Loops
  • Arrays
  • Classes and Objects
  • Exceptions, Lists, Threads & Files

HTML Fundamentals

HTML Fundamentals
by sololearn.com

This FREE course will teach you how to design a web page using HTML. Complete a series of hands-on exercises and practice while writing real HTML code.

  • Overview
  • HTML Basics
  • Challenges
  • HTML5

Knowledge Bases

Since my `reboot`, I've been pursuing the goal of making everything I use and learn in my work publicly available so that others can hopefully use it as a guide.

Repositories

Data Science Courses

Python for DS.

Python for Data Science
by sololearn.com

In this course, you will learn about different Python libraries used for data manipulation and visualization such as numpy, pandas, matplotlib and more.

  • Introduction
  • Math Operations with NumPy
  • Data Manipulation with Pandas
  • Visualization with Matplotlib

Data Science

Data Science
by sololearn.com

Data Science is a must know discipline in the era of big data. Today, companies and industries must make data-driven decisions to survive. Learn how Data Science works.

  • Data Manipulation
  • Data Analysis
  • Data Visualization
  • Linear Regression
  • Classification
  • Clustering Wines

R Fundamentals

R Fundamentals
by sololearn.com

During this course we will learn the basics of R, see how to create programs that store & manipulate data, as well as perform data analysis tasks using various data sets and visualize the results using graphs and charts.

  • Introduction
  • Programming in R
  • Data Structures
  • Analyzing Data with R
  • Visualization

SQL Fundamentals

SQL Fundamentals
by sololearn.com

This course covers an array of SQL-related topics, such as retrieving, updating and filtering data; functions and subqueries; creating & updating tables; & many more!

  • Basic Concepts
  • Filtering, Functions, Subqueries
  • JOIN, Table Operations
  • Challenges

Overview of Neo4j

Neo4j Cypher
by neo4j.com

This online course introduces you to Neo4j 4.x and the Neo4j Graph Platform. You will learn what a graph database is and how it is supported with Neo4j. You will learn about the features of Neo4j and the many ways you can access a Neo4j instance.

  • What is a Graph Database
  • The Neo4j Graph Platform

Querying with Cypher

Neo4j Cypher
by neo4j.com

This course introduces you to using Cypher to query a Neo4j database. This course is intended for developers, administrators, architects, data scientists, and data analysts.

  • Introduction to Cypher
  • Using the WHERE clause to filter queries
  • Working with patterns in Cypher queries
  • Working with different types of Cypher data
  • Controlling the query chain of processing
  • Controlling how results are returned

Nodes and Relationships

Neo4j Cypher
by neo4j.com

This online course is a collection of lessons and and hands-on exercises which help you build a good starting knowledge for updating a Neo4j 4.x database. You will learn Cypher syntax for updating the database and perform numerous hands-on exercises.

  • Creating Nodes
  • Creating Relationships
  • Deleting Nodes and Relationships
  • Merging Data in the Graph

Using Indexes and Query

Neo4j Cypher
by neo4j.com

This online course is a collection of lessons and and hands-on exercises which teaches you how to create constraints and indexes for your Neo4j database, as well as use full-text schema indexes. You will also learn some best practices in querying the database.

  • Defining constraints in the database
  • Creating and using indexes
  • Using query best practices

Importing Data with Neo4j

Neo4j Cypher
by neo4j.com

This online course is a collection of lessons and and hands-on exercises that will help you learn the many ways that you can import data into a Neo4j database.

  • Overview of your options for importing data into Neo4j
  • Using LOAD CSV to load data
  • Using APOC for loading data
  • Using the neo4j-admin tool for loading data
  • Using an application for loading data
  • Using the Neo4j ETL Tool to load data from an RDBMS

Basic Neo4j 4.x Admin

Neo4j Cypher
by neo4j.com

This online course is a collection of lessons and and hands-on exercises which teach you how to manage a Neo4j 4.x DBMS.

  • Managing a Neo4j Instance
  • Using cypher-shell to Manage Databases
  • Changing the Database Location
  • Checking Database Consistency
  • Scripting to Manage Databases
  • Configuring Plugins

Ethical Hacking Courses

CompTIA Pentest+

CompTIA Pentest+
by tryhackme.com

This CompTIA Pentest+ pathway allows individuals to practice the majority of practical skills required for the CompTIA PenTest+ exam. In this you will learn about

  • Industry standard penetration testing tools
  • Identifying and exploiting different network services
  • Exploiting web applications through today’s most common vulnerabilities
  • Understanding Windows active directory and attacking Kerberos
  • Post exploitation techniques (with Powerview, Bloodhound and Mimikatz)

Offensive Pentesting

Offensive Pentesting
by tryhackme.com

The aim of this path is to make you ready for real world penetration testing by teaching you how to use industry standard tools along with a methodology to find vulnerabilities in machines.

  • Vulnerability Scanning, Privilege Escalation, Web Application Attacks
  • Handling Public Exploits, Password Cracking, Metasploit Framework
  • Basic exploit development
  • Exploitation of services vulnerable to buffer overflow
  • Active Directory Basics, Exploiting a Domain Controller, Post exploitation tasks

Cyber Defense

Cyber Defense
by tryhackme.com

The Cyber Defense path aims to give a broad introduction to the different areas necessary to detect and respond to threats. This path will be looking at the following areas:

  • Getting Started
  • Threat and Vulnerability Management
  • Security Operations and Monitoring
  • Threat Emulation
  • Incident Response & Forensics
  • Malware Analysis and Reverse Engineering

Web Fundamentals

Web Fundamentals
by tryhackme.com

To successfully attack and exploit web applications, you need to understand how they work. The first section (Web Fundamentals) will give you all the pre-requisite knowledge on this.

  • understand how web applications work
  • utilise industry standard tooling when attacking web applications
  • explain and exploit common web vulnerabilities
  • apply this knowledge to other targets

Complete Beginner

Complete Beginner
by tryhackme.com

The beginner path aims to give a broad introduction to the different areas in Computer Security. This path will be looking at the following areas:

  • Get familiar with the linux command line.
  • Learn web application security concepts through the OWASP Top 10
  • Using essential tools like NMAP to enumerate infrastructure.
  • Using Python and Bash to carry out different tasks.
  • Privilege Escalation

Pre Security

Pre Security
by tryhackme.com

This learning path will teach you the pre-requisite technical knowledge to get started in cyber security. To attack or defend any technology, you have to first learn how this technology works.

  • Cyber Security Introduction
  • Network Fundamentals
  • How The Web Works
  • Linux Fundamentals
  • Windows Fundamentals

Advent of Cyber 3

Advent of Cyber 2
by tryhackme.com

Get started with Cyber Security in 25 days, by learning the basics and completing a new, beginner friendly security exercise every day leading up until Christmas; an advent calendar but with security challenges and not chocolate.

  • Web Exploitation
  • Networking
  • OSINT
  • Cloud
  • Blue Teaming
  • Post Exploitation

Advent of Cyber 2

Advent of Cyber 2
by tryhackme.com

Get started with Cyber Security in 25 days, by learning the basics and completing a new, beginner friendly security exercise every day leading up until Christmas; an advent calendar but with security challenges and not chocolate.

  • Web Exploitation
  • Networking
  • Blue Teaming
  • Scripting
  • Reverse Engineering

Ethical Hacking awards

Monthly Hacker

1 Month Streak

Being the top hacker of the month

180 Day Streak

180 Day Streak

Hacking for 180 days in a row

90 Day Streak

90 Day Streak

Hacking for 90 days in a row

30 Day Streak

30 Day Streak

Hacking for 30 days solid

7 Day Streak

7 Day Streak

Achieving a 7 day hacking streak

Pentesting Principles

Pentesting Principles

Completing the 'Introduction to Pentesting' module

Pentester Tools

Pentester Tools

Completing the Pentesting Tools series

Linux PrivEsc

Linux PrivEsc

Mastering Linux Privilege Escalation

cat linux.txt

cat linux.txt

Being competent in Linux

Networking Nerd

Networking Nerd

Completing the 'Network Fundamentals' module

Intro to Web Hacking

Intro to Web Hacking

Completing the 'Introduction to Web Hacking' module

OWASP Top 10

OWASP Top 10

Understanding every OWASP vulnerability

Burp'ed

Burp'ed

Completing the BurpSuite room

Webbed

Webbed

Understands how the world wide web works

World Wide Web

Completing the 'How The Web Works' module

Docker

Docker

Breaking out of a Docker container in 7 different ways

Wireshark

Wireshark

Competent with Wireshark & Packet Analysis

Metasploitable

Metasploitable

Contains the knowledge to use Metasploit

OhSINT

OhSINT

Completing the OhSINT room

Hash Cracker

Hash Cracker

Cracking all those hashes

Windows Priv Esc

Windows Priv Esc

Mastering Windows Privilege Escalation

Mr. Robot

Mr. Robot

Completing the Mr. Robot room

Blue

Blue

Hacking into Windows via EternalBlue

Ice

Ice

Exploiting Windows via a media server

Overpassed

Overpassed

Completing the Overpass series

WindCorp

WindCorp

Completing the WindCorp series

Advent of Cyber 3

Completing Advent of Cyber 3!

Christmas 2019

Taking part in the Christmas CTF!