• Home
  • About Me
  • Resume
  • Projects
  • Certifications
  • Skills
  • Professional Experience
  • Blog
  • Latest Cybersecurity News
  • Social
  • Contact
  • More
    • Home
    • About Me
    • Resume
    • Projects
    • Certifications
    • Skills
    • Professional Experience
    • Blog
    • Latest Cybersecurity News
    • Social
    • Contact

  • Home
  • About Me
  • Resume
  • Projects
  • Certifications
  • Skills
  • Professional Experience
  • Blog
  • Latest Cybersecurity News
  • Social
  • Contact

Michelle's Projects

Centralized Financial Data Validation Database (Access / SQL)

This project demonstrates hands-on experience with data validation, system testing, and risk-aware development in a regulated environment.

Project Overview
Designed and developed a centralized Microsoft Access database to support application testing, data validation, and reporting during an enterprise SAP transition in a regulated banking environment. The solution enabled Accounting teams to import, compare, and reconcile financial data from multiple source systems, improving data accuracy and readiness for parallel testing.

Key Contributions

  • Built a structured Access database using VBA and SQL to support controlled data imports and reconciliation workflows.
  • Enabled comparison of financial data across SAP financial tables, regulatory reporting, general ledger, and account movement sources.
  • Supported testing and validation efforts by identifying discrepancies and improving confidence in data integrity during system transition.
  • Designed user-friendly forms and queries to streamline reporting and reduce manual validation effort for Accounting users.

Technologies Used
Microsoft Access (VBA), SQL, CSV imports, Data Validation & Reconciliation

Vulnerability Assessment & Network Analysis Lab

Project Overview
Conducted hands-on vulnerability assessments in controlled lab environments using industry-standard security tools, including Wireshark, Nmap, and Nessus. Work was performed across St. John’s University lab environments and a personal home lab to strengthen practical cybersecurity skills.

Key Activities

  • Identified potential vulnerabilities through network scanning and traffic analysis.
  • Analyzed network behavior to detect misconfigurations and security weaknesses.
  • Validated findings and applied remediation steps, followed by rescanning to confirm resolution.
  • Documented observations and outcomes to support vulnerability management and risk assessment practices.

Tools & Technologies
Wireshark, Nmap, Nessus, Linux, Network Traffic Analysis

Personal Portfolio Website Development

Project Overview
Designed and developed a custom personal portfolio website to showcase cybersecurity experience, technical projects, certifications, and professional background. Built using HTML, CSS, and JavaScript, the site serves as a centralized platform highlighting hands-on technical work and career progression.

Key Contributions

  • Developed a responsive, custom website using HTML, CSS, and JavaScript, separate from template-based platforms.
  • Structured the site to present projects, resume content, certifications, and contact information in a clear, professional format.
  • Applied front-end development best practices and user experience principles to improve usability and presentation.
  • Continuously iterating on design and functionality to reflect evolving technical skills and career focus.

Technologies Used
HTML, CSS, JavaScript, Front-End Development, UX Design Principles

Dual-Boot System Configuration (Windows & Linux)

Project Overview
Configured a dual-boot system on a Windows laptop with Ubuntu Linux to strengthen familiarity with Linux environments and operating system security concepts. The setup enabled isolated environments for testing, development, and security-focused experimentation.

Key Contributions

  • Installed and configured a dual-boot environment with separate partitions for Windows and Ubuntu Linux.
  • Managed bootloader configuration and partitioning to support stable OS selection and system performance.
  • Practiced Linux system administration tasks, including file system management, permissions, and troubleshooting compatibility issues.
  • Used the Linux environment to explore security hardening concepts and safe experimentation in a controlled setup.

Technologies Used
Ubuntu Linux, Windows OS, Dual-Boot Configuration, File Systems, Bootloader Management

Digital Forensics & Data Recovery Analysis

Project Overview
Performed hands-on digital forensics and data recovery exercises using industry-standard forensic tools to recover hidden and deleted data from storage media. The project focused on maintaining data integrity and supporting investigative workflows in controlled environments.

Key Contributions

  • Used FTK Imager and Autopsy to identify, extract, and analyze deleted and hidden files from disk images.
  • Recovered fragmented data from unallocated space and reconstructed files for analysis.
  • Verified data integrity using cryptographic hash functions (MD5, SHA-1) to ensure recovered files were not altered during analysis.
  • Documented findings and methodologies to support forensic investigation and evidence-handling best practices.

Tools & Technologies
FTK Imager, Autopsy, Digital Forensics, Data Recovery, Hashing (MD5, SHA-1)

Linux System Administration & Networking Fundamentals

Project Overview
Developed hands-on Linux system administration skills through practical exercises focused on file management, permissions, networking, and basic automation in controlled environments.

Key Contributions

  • Navigated Linux file systems using Bash commands to manage files, directories, and user permissions.
  • Performed basic network diagnostics and connectivity testing using common Linux networking utilities.
  • Automated routine tasks such as file backups and simple monitoring using shell scripts.
  • Strengthened troubleshooting skills related to system resources, permissions, and network issues.

Technologies Used
Linux, Bash, File Systems, Networking Utilities, Automation Scripts

Cybersecurity Skills Development (TryHackMe Labs)

Project Overview
Completed hands-on cybersecurity labs and guided challenges focused on foundational security concepts and practical tool usage in simulated environments.

Key Activities

  • Practiced vulnerability analysis, network traffic inspection, and basic exploitation techniques.
  • Applied tools such as Wireshark, Nmap, and Burp Suite to analyze systems and identify weaknesses.
  • Reinforced core cybersecurity concepts including threat detection, web security, and cryptography fundamentals.

Tools & Technologies
Wireshark, Nmap, Burp Suite, Network Security Concepts

Programming & Web Development Foundations

Project Overview
Strengthened programming and web development fundamentals through structured, hands-on coursework focused on practical application.

Key Areas

  • Built responsive web components using HTML, CSS, and JavaScript.
  • Practiced Python programming concepts including data structures, control flow, and library usage.
  • Applied coding best practices through interactive projects and exercises.

Technologies Used
HTML, CSS, JavaScript, Python

Copyright © 2026 Michelle Arena - All Rights Reserved.

Powered by

This website uses cookies.

We use cookies to analyze website traffic and optimize your website experience. By accepting our use of cookies, your data will be aggregated with all other user data.

Accept