Scholar & Intern Program | Texas A&M University–San Antonio
Successfully completed the Viceroy Scholar program and earned the opportunity to attend Black Hat, one of the world's premier cybersecurity conferences.
Welcome to my comprehensive collection of cybersecurity workshop resources! During my time as a Viceroy Cybersecurity Scholar & Intern in 2025, I developed and delivered educational materials covering essential cybersecurity topics. This site serves as both a digital archive and community resource for current and future scholars in the program.
Comprehensive introduction to network discovery techniques, scanning methodologies, and reconnaissance tools used by cybersecurity professionals for threat assessment.
✅ CompleteDeep dive into password security fundamentals, common attack vectors, hash cracking techniques, and defensive strategies for robust authentication systems.
✅ CompleteAdvanced phishing attack methodologies, social engineering tactics, and comprehensive administrative defenses to protect organizational infrastructure.
✅ CompleteExploration of web application vulnerabilities, OWASP Top 10 security risks, exploitation techniques, and effective mitigation strategies.
✅ Complete