Computer Information Systems · Cal Poly Pomona

Josh
Hung

CIS student pursuing a future in Cybersecurity. Passionate about protecting systems, understanding threats, and building secure digital infrastructure.

Building a foundation in security

I'm a Computer Information Systems student at Cal Poly Pomona with a 3.98 GPA and a strong interest in Cybersecurity, network defense, and practical technical problem-solving.

My experience is grounded in coursework, personal projects, hands-on labs, and cybersecurity competitions, where I continue building skills in networking, system security, and threat analysis.

Outside the classroom, I sharpen those skills through platforms like Hack The Box and picoCTF while continuing to learn from real-world tools, labs, and independent study.

Tools & Technologies

🛡️ Cybersecurity

Threat detection, investigation, and practical defensive security workflows.

Network Security Threat Analysis Vulnerability Assessment Incident Response Log Analysis Security Monitoring OSINT Wireshark Nmap
💻 Programming Languages

Core scripting and data languages used for automation, analysis, and tooling.

Bash Python SQL
🖧 Networking

Foundational network concepts, traffic analysis, and hands-on lab work.

TCP/IP DNS Subnetting Firewalls VPN Cisco Packet Tracer
🖥️ Systems & Tools

Operating systems, productivity software, virtualization, and day-to-day development tools.

Linux Windows Server VMware Workstation Kali Linux Git/GitHub Office 365 Google Workspace VS Code

What I've Built

01
Network Port Scanner
A lightweight Python-based port scanner built to understand how tools like Nmap work under the hood — scanning targets, identifying open ports, and detecting services.
Python Sockets Networking
View on GitHub →
NP
Hardening Linux Presentation & Workshop
Non-public work completed in March 2026, focused on Linux threat hunting, privilege escalation, persistence techniques, and practical hardening workflows.
Non-Public Linux Security Threat Hunting Privilege Escalation Kali Linux Ubuntu iptables
• Delivered a technical presentation on Linux threat hunting, privilege escalation, and persistence techniques to 15 participants
• Led a hands-on workshop using a Kali vs Ubuntu lab to simulate end-to-end attack and remediation workflows
• Demonstrated privilege escalation vectors and applied hardening controls (iptables, least privilege) to reduce system attack surface

Credentials & Goals

🎓
CompTIA Security+
CompTIA
Pursuing
🌐
Google Cybersecurity Certificate
Google / Coursera
In Progress

Let's Connect

Feel free to reach out if you'd like to connect, collaborate, or talk cybersecurity.