I'm a passionate student at 42 Madrid, diving deep into the world of programming and computer science through the innovative peer-to-peer learning methodology. When I'm not tackling the core curriculum, you'll find me exploring cybersecurity and experimenting with various programming projects out of curiosity.
- ๐ซ 42 Student: Mastering C, algorithms, and system programming
- ๐ Security Advocate: Exploring cybersecurity, ethical hacking, and secure coding practices
- ๐ง Curious Learner: Experimenting with ML concepts like neural networks using NumPy
- ๐ Innovation: Creating projects that bridge theory and practical application
- ๐ฑ Continuous Learning: Always exploring new technologies and security paradigms
- Systems Programming: Memory management, data structures, algorithms
- Unix/Linux: Shell scripting, system calls, process management
- Network Programming: TCP/UDP protocols, client-server architecture
- Security Concepts: Buffer overflows, secure coding, vulnerability analysis
- Graphics: 2D/3D rendering, mathematical transformations
Progressing through the 42 curriculum with projects involving:
- Low-level programming and memory optimization
- Algorithm implementation and complexity analysis
- System administration and DevOps concepts
- Security-aware programming and vulnerability prevention
- Mathematical problem-solving
Diving into the world of information security with focus on:
- Ethical Hacking: Learning penetration testing methodologies
- Vulnerability Research: Understanding common security flaws (OWASP Top 10)
- Network Security: Analyzing traffic and identifying threats
- Secure Coding: Implementing security best practices in development
- CTF Challenges: Participating in Capture The Flag competitions
Currently experimenting with various concepts out of curiosity:
- Implementing basic neural networks using NumPy to understand the math
- Exploring machine learning fundamentals
- Building small projects to grasp core algorithms
Core curriculum implementations
- System-level programming in C
- Algorithm optimization challenges
- Unix system programming
- Graphics and mathematical computations
Exploring cybersecurity through hands-on practice
- Vulnerability assessment scripts
- Network analysis tools
- CTF writeups and solutions
- Secure coding examples
Small projects driven by curiosity
- Basic neural network implementation with NumPy
- Algorithm visualizations
- Mathematical concept explorations
"The best way to understand something is to build it yourself, and the best way to secure it is to think like an attacker"
I believe in learning by doing and understanding the fundamental principles behind technologies. This approach helps me:
- ๐ฏ Grasp core concepts deeply
- ๐ง Debug and optimize effectively
- ๐ Innovate and adapt solutions
- ๐ Bridge theory with practice
- ๐ก๏ธ Think defensively while coding
- ๐ Reverse Engineering: Understanding how systems work under the hood
- ๐ Web Security: Learning about modern web application vulnerabilities
- ๐ฑ Mobile Security: iOS and Android security research
- ๐ CTF Competitions: Sharpening skills through competitive hacking
- ๐ค AI Security: Exploring the intersection of AI and cybersecurity
I'm always excited to:
- ๐ฅ Collaborate on cybersecurity and programming projects
- ๐ฌ Discuss 42 School experiences and cybersecurity trends
- ๐ Share learning resources and CTF writeups
- ๐ Explore new programming and security challenges
- ๐ Exchange ideas about ethical hacking and defensive programming