Designed for

About Me

Cyber Security lover who likes to learn new technologies that are used for cybner security, for example: reverse enginnering: ida pro, edb, Binary ninja, Ghidra. Pen testing: implementing security against sqli, XSS, brute forcing, insecure password storage, csrf, directory traversal.

Data analytics: Using powertools such as powerbi, tableu, R studio for creation of graphs and powerful dashboards.

Additionally, I possess a keen interest in artificial intelligence, particularly in understanding neural pathways, decision trees, and the underlying mechanisms of decision-making. My enthusiasm for AI complements my cybersecurity skills, enabling me to explore innovative solutions and advance my knowledge in intelligent systems and their applications in security.

Cyber Crime & IT Security.

  • Phone: 089 499 3374
  • City: Wexford
  • Project Supervisor: Richard Butler
  • Degree: Bachelor of Science (Honours) Cybercrime and IT Security
  • Email:

About the Project

This project was initiated following an extensive research phase in the field of cybersecurity. My investigation focused on identifying the core competencies and knowledge areas that are essential for professionals in the industry. Motivated by the insights gained, I decided to leverage this valuable information to develop a learning platform. This platform is designed to empower aspiring cybersecurity experts by providing them with access to critical learning resources and practical tools, thus enhancing their skills and readiness for industry challenges.

Key Features and Functionalities of the Learning Platform:

Robust Admin Console:

The admin console serves as the central command center for the platform. It enables comprehensive management of the platform, allowing administrators to manage user profiles and update course content efficiently. This role-based access ensures that only authorized personnel can manipulate the critical functionalities of the platform, enhancing security and integrity.

Features such as user registration, profile editing, and role assignments are streamlined through the admin console. It also provides tools for content management, including the addition of new course materials, modification of existing content, and deletion of outdated information.

Dynamic Content Management System:

A dynamic content management system is integrated to facilitate the easy addition, editing, and management of course chapters and materials. This system is designed to be intuitive and user-friendly, ensuring that administrators can quickly update course content to keep pace with the evolving field of cybersecurity.

Secure User Authentication and Session Management:

The platform features a secure user authentication system that ensures that user data is protected against unauthorized access. Session management techniques are employed to maintain user state across the platform, providing a seamless and secure user experience.

Engaging Learning Experience:

The platform is designed with the user experience in mind, featuring an intuitive interface that makes navigation and learning straightforward and effective. Users can access a wide range of learning materials formatted to support different learning styles and preferences.

Accessibility and Responsiveness:

Accessibility is a key consideration, with the platform being fully responsive and optimized for various devices and screen sizes. This ensures that users can access learning materials anytime, anywhere, on any device.


Below is a gallery showcasing various aspects of the project. Featured are the homepage, the login and registration interfaces, and the course page which offers a rich array of content exclusively available to authenticated users. Additionally, the administrative panels are highlighted, illustrating their sophisticated functionality that empowers administrators to seamlessly manage user accounts and curate content — from adding and removing users to updating the website's content directly, all without direct interaction with the database or the underlying code.

Technologies Used

This project integrates several key technologies to ensure robust, secure, and dynamic web development. From frontend HTML and JavaScript to backend PHP and database management with MySQL, each technology contributes significantly to the platform’s functionality. The inclusion of Laragon enhances local development, providing a reliable and manageable server environment.


HTML forms the backbone of the platform, structuring the web content and ensuring that all information is presented in a clear and accessible format.


Cascading Style Sheets (CSS) is the style sheet language used for describing the presentation of a document written in HTML. CSS is pivotal in web design, enabling the separation of content from design elements such as layouts, colors, and fonts.


JavaScript enhances interactivity and improves user experience by enabling dynamic content and responsive elements across the platform.


PHP is used for server-side scripting, managing the logic of user authentication, data processing, and interfacing with the MySQL database.


Laragon provides a fast, reliable, and isolated development environment, facilitating a seamless workflow and easy PHP management.


MySQL handles data storage, ensuring robust data management and high performance in handling queries and transaction processing.

Platform Security

The platform prioritizes security by employing advanced hashing and salting techniques for password storage, ensuring robust protection against unauthorized access. I also implement rigorous SQL injection prevention strategies using prepared statements to safeguard our database. Additionally, my defenses against cross-site scripting (XSS) include effective encoding and validation mechanisms to prevent malicious scripts from running.

"Using advanced hashing and salting of passwords, the authentication system enhances security by ensuring that even if data breaches occur, the actual passwords remain secured."

Password Security

Hashing & Salting

"The SQL injection prevention approach uses prepared statements to securely query the database, effectively neutralizing one of the most prevalent threats in web applications."

SQL Injection

Prepared Statements

"Protecting the platform from XSS, we employ stringent content sanitization to ensure that all inputs are checked and encoded to prevent malicious data from being executed."

Cross Site Scriptin XSS



Thank you for exploring the 'CyberTools' showcase. I truly hope you found the platform engaging and useful. CyberTools is designed to enhance the skills of cybersecurity professionals at all levels, integrating the latest in technology and educational insights. I’m thrilled to share this project with you and look forward to supporting your journey in cybersecurity. Thank you again for your interest and trust!


Wexford Ireland


089 499 3374