Hello there 👋 Welcome to my website!

HomePage

 

hello, I’m jason kek Jun kai 😀 nice to meet you 👋🏼

Who am I ?


Hi I'm Jason Kek Jun Kai! a final year student at ITE CW doing Higher Nitec in Cyber & Network Security.

At 13, I joined my first hackathon and realized that working with other IT specialist excites me to learn more. Experience gained from these events inspired me to further my passion via cybersecurity courses.

As a member of AiSP(Association of Information Security Professionals) and being the president of my school cybersecurity club, I get to work with other like-minded individuals and give lessons on cybersecurity which excites me to learn more!

I am doing a 5-year mentorship with IBM after top in an aptitude test. I get to attend weekly workshops such as Industry visits, in-depth technical skills, workplace competency training as well as a 1 to 1 mentor to guide me through my journey for Cybersecurity too.

I been actively joining local and international cybersecurity competitions such as GovTech CTF and DEFCON 28 as well as taking up certifications at my own time. Most notably, I am a Certified Ethical Hacker(CEHv11),Certified SOC analyst with EC-council, Fortinet NSE 1 & 2, CCNA

currently aiming to pass CEH master & OSCP before I graduate from ITE.


Keep scrolling to see my Cybersecurity projects, Life as a student in IBM mentorship, ITE and more!


My Certificates.

CEH cert.PNG

Certified Ethical Hacker (CEH)v11

The CEH exam is a 4-hour exam with 125 multiple choice questions. This knowledge-based exam proved my skills in Information Security Threats and Attack Vectors, Attack Detection, Attack Prevention, Procedures, Methodologies and more!

SOC cert.PNG

certified SOC Analyst v1

Working in a SOC has been my dream since young. The Certified SOC Analyst (CSA) is the first step to joining a security operations center (SOC). It is engineered for current and aspiring Tier I and Tier II SOC analysts to achieve proficiency in performing entry-level and intermediate-level operations.

NSE 1.PNG

Network Security Expert 1

Information Security Awareness is the entry level course in the Fortinet Network Security Expert (NSE) program. This course taught me cyberthreats and advises how to secure information and data.

NSE2.PNG

Network Security Expert 2

NSE 2 The Evolution of Cybersecurity course, which I learnt about the types of security products that security vendors created to address those Vulnerabilities.

CCNA course.PNG

CCNA Course

I am currently aiming to pass CCNA certification exam before I graduate from ITE.

BLOCKCHAIN CERT.PNG

Blockchain Essentials Course

Took up this course to apply blockchain to my project for National Robotics competition.

AWS.jfif

AWS Certified Solutions Architect course (20 Hours 3min)

Whatever it is, the way you tell your story online can make all the difference.

splunk.jfif

Splunk Fundamentals

Aiming for Splunk core certified user

GOv Tech.PNG

GOVTECH CTF

Led my team of 4 to win top 30 of 200 teams in this jeopardy style, Cybersecurity CTF competition organised by GOVTECH.

standcon2021.PNG

STANDCON CTF

Led my team of 4 to win 1st of 64 teams in this jeopardy style, Cybersecurity CTF competition organized by n0h4ts

CISSP Course (28Hours 48min)

Passed practice exam on first attempt.

CCNP Course (18 Hours 48min)

Did a whole lot of packet tracer and troubleshooting while doing this course especially on configuring HSRP, STP and ACL standard & Advanced

python training.PNG

Python Essential Training.

Took this course to help myself understand Python essentials better.

DATA VISUALISATION.PNG

Data Visualization Course

During this course, I learn how to turn data sets such as from Microsoft excel into analytics visualizations and business intelligence functions using Microsoft Power BI.

Linux training.PNG

Linux professional Institute training

Took this course during my free time to help myself understand Linux essentials better.

MCSA Course.PNG

MCSA Course

Took up this course during my school holidays to help myself understand my school module on system administration better.

UX design.PNG

Principle of UX Design

Took up this course during my school holidays to help myself understand UX/UI principles. During this course, I learnt how to make apple watch UI, Animating with keyframes and drivers and using assets in Adobe software’s.


 

Other Certificates.

eagles award.png

EAGLES AWARD

Received EAGLES award in recognition for leadership skills for leading in providing technical support and revamped existing skills for 60 Individuals.

edusave character award.png

Edusave character Award

For outstanding performance on character, leadership, conduct, learning dispositions and academic performance. (Secondary school)

HECB.PNG

Higher Education Community Bursary award

For outstanding academic and character performance.(ITE)

Young Engineer award.png

Young Engineer award

cchy cert.png

Certificate of Appreciation

neg cert.PNG

Negotiation Skills


Cybersecurity projects.

FTP Attack

ARP poisoning

Spear Phishing (Social engineering)

SMB attack with remote code xexcution via social engineering and DoS attack

HAckerOne.PNG

HackerOne Bug Bounty program.

During my free time, I like to participate in bug bounty program. Recently, I found a vulnerability at a KPOP audition website that have CVE-2007-6750 and reported it via the HackerOne platform.

F society.PNG

F Society.

Inspired by the movie MR ROBOT, Fsociety was a tool I contributed during DEFCON 28. As part of røøtz Asylum(A place where kids learn white-hat hacking to better the world) we created this simplified penetration's testing tool for kids to understand easier.

burpsuite.PNG

Brute-force Dictionary attack.

I learnt to execute brute-force attacks during my free time. Using Burpsuite, I used Kali Linux (attacking machine) & metasploitable (Target Machine) and Hashcat. I was able to hack into “John’s account”.

Hackthebox.PNG

HACKTHEBOX

HACKTHEBOX is an online cybersecurity training platform that allows me to network with other ethical hackers as well as joining and practicing for CTF competitions and penetration testing.

AlienVault.PNG

AlienVault SIEM

I have been keeping up to date with latest Cybersecurity news and evolving threats not only by watching the news but subscribing to various SIEM Open source threat exchange platforms such as AlienVault.

synflood.PNG

SYNFlooding dos attack

Using metasploit framework, I used auxiliary/dos/tcp/synflood module to execute the synflooding attack.

tryhackme.PNG

Try Hack Me

Top hacker in Singapore

FTP Attack mitigation

ARP poisoning mitigation

Spear phishing mitigation ( Social engineering)

Mitigating malicious Sources

H@cktivitycon

So glad that I attended H@cktivitycon conference & CTF by HackerOne! Host and produced by NahamSec! It was amazing to network and learn from talented ethical hackers from around the world🌏

SQL enumeration.

I learn SQLMap during my free time. Using Kali Linux (attacking machine) & metasploitable (Target Machine, Web server) I was able to identify and exploit the SQL injection flaws.

android hacking.PNG

Android Hacking.

I learnt Multi/handler tool during my free time and demonstrated the dangers of downloading malicious applications on android phones. Using this tool, I was able to carry out Man-In-The-Middle attacks, Reverse TCP, perform an involuntary backup, take full control of the android phone using Metasploit shellcode.

ARP+po.jpg

ARP Poisoning Attack.

I learnt how to execute ARP poisoning attack during my free time from youtube. Using Ettercap in Kali Linux (attacking machine) & metasploitable (Target Machine) I was able to intercept the password by spoofing the MAC address.

lib.jpg

Research with Library books.

I have been constantly expanding my knowledge on computer penetration testing, forensics, network security and security operations not only through the internet but also borrowing books from the library.

FTP attack.PNG

FTP backdoor command execution

Using metasploit framework, I used exploit/unix/ftp/vsftpd_234_backdoor module and cmd/unix/interact payload to execute the FTP backdoor command execution.

immersiveLabs.PNG

ImmersiveLabs

Top 3 in my cohort in 2020

Other Projects

Startup Weekend Singapore - I was one of the mentor to recommend cybersecurity solutions to 750 participating members from 43 different countries.

Mosque Tech challenge - using micro-bit, my team and I was able to make an app that allow elderly to exercise at home by hitting on the micro-bit sensor.

Universal Drones Singapore (UDS) - Universal Drones Singapore is a non-profit group created by me and my friends to educate drone novice by providing tutoring sessions, a platform for drone enthusiast to meet and level up their skills and to educate safety regulation for aerial activities in collaboration with CAAS ( Civil Aviation Authority of Singapore).

Hackathon@SG - Together with my team of 5, we created sustainable automatic plant watering system using Arduino.

OneMaker Group (OMG) - I was one of the volunteer to teach kids how to use DJI Robomaster.

 

Life @ ITE

Cybersecurity Student

The modules I learn as part of my Higher National institute technical education on Cyber & Network Security helped me develop a greater understanding in Cyber and Network security systems and exposed me to the necessary skills that a Network Security associate require in today's fast-paced digital era. Such as providing technical support for servers, networks as well as perform vulnerability scanning, and incident monitoring and reporting.



Core Modules.

Computer Management - Install & configure operating System, peripherals & troubleshooting.



Enterprise Networking - Configured Cisco 1941 Router & 2960 switches. OSPF, VLANS, ACL & NTP.



System Administration - Configured Active directory services for Windows 2012.



Virtualization - Configured VMware workstation, ESXi 6.0, vCentre & vMotion.



IT Security - Configured Fortigate firewalls, Intrusion detection system (IDS) & data encryption technologies.



Security Operations - Cybersecurity laws, basic SIEM systems, penertration testing, vulnerability assessment & patching.



Linux - Configured Apache web server NFS, FTP, backup & scripting on Debian 9, Ubuntu & kali linux.

Python Scripting - Basic print, variable, class & file operations using PyCharm.



Some Photos taken during project presentations.

MicrosoftTeams-image+%287%29.jpg

Sys admin presentation

Implementing Active directory.

0936a65d-891c-4c27-b40e-bf250dd30f43.jpg

I.T Security Presentation.

Picture of me (in black jacket) with my groupmate explaining how we simulate a penetration testing, vulnerability report and Security systems implementations.

ppp1.jfif

Sec Ops presentation

During my Sec Ops presentation, I also show how a Windows 11 Machine can be hacked using Multi/Handler and MSFVENOM.

MicrosoftTeams-image (6).png

Explaining sys admin project

Picture of me explaining the deployment of active directory group policy for a given requirements to my class.

ppp6.jfif

Sec Ops presentation

Picture of me discussing and explaining how ARP poisoning attacks are executed.

ppp3.jfif

Sec Ops presentation

Vulnerability scanning for sec ops project


 

Cybersecurity Club - CCA & Robotics projects.

Being the president of my school cybersecurity club, I get to work with other like-minded individuals and give lessons on cybersecurity which excites me to learn more!

As the group leader of multiple Hackathons and tech competitions has helped me gain valuable leadership, communication and planning skills.

I led my team to win at the National Robotics competition, Hackaton@SG and GovTech CTF.

I helped my school library program a robot (Temi) which assisted with library operations and enforcing safe distancing measures using AI and machine learning.

 

Some snapshots and photos of Cybersecurity Club & Robotics projects.

CCA, google dorking.PNG

Session on how to execute google dorking and perform OSINT investigation.

cca privacy.PNG

Session on how to stay secure and improve privacy online.

temi.PNG

Temi robot

A robot I made, assisting with library operations and enforcing safe distancing measures using AI and machine learning.

CCA project.PNG

Face Mask detection using jupyter notebook and help from Github.

Later deployed on a robot (Temi) which assisted with library operations and enforcing safe distancing measures.

NBC.jpg

National Robotics Competition Team.

Led my team to win Top 10 out of 200 schools.

NBC1.jpg

National Robotics Competition.

Led my team to win Top 10 out of 200 schools.


IBM P-TECH mentorship 

About:

IBM P-TECH is a IBM-ITE-Polys partnership and global education program that help population prepare for “new collar” roles such as Cybersecurity Specialist, Application Developer and Cloud Engineer. to strengthen reginal economies.

My experience with P-TECH Mentorship

Being part of the P-TECH program has been an eye-opening experience as I get to attend workshops that are not only related to (STEM) disciples but also cultivating soft skills and self-awareness through the mindfulness and communication workshops.

I get to attend weekly workshops such as Industry visits, in-depth technical skills and workplace competency training. As well as a 1 to 1 mentor to guide me through my Journey for Cybersecurity too.

Being a Cybersecurity student, sometimes there could be concepts and terms I can't understand and P-TECH cybersecurity workshops helped me understand better. Recently, I passed CEH ( Certified Ethical hacker) and SOC ( Security Operations Centre) analyst certification on my own with some guidance from my P-TECH mentor who have experience doing I.T related certifications exams.


Some photos during IBM P-TECH  workshops.

data hackathon with Deloitte mentor volunteers.jpg

data hackathon with Deloitte mentor volunteers.

cybersecurity workshops slides.PNG

IBM Cybersecurity workshops on SIEM and Forensics.

CSA site visit.PNG

CSA (Cybersecurity Agency) site visit.

App dev appentices workshop.jpg

App dev apprentices workshop.

Motivation and Self-Management workshop.jpg

Motivation and Self-Management workshop.

ibm hacking demo.PNG

Demonstration of how man-in-the-middle and rainbow table attacks are done.

Govtech visit.png

GovTech site visit.

p-tech attendance.png

Certificate of Attendance.


Testimonials.

ITE testimonials.PNG

ITE Testimonial

Written by class advisor.


IBM testimonial.png

IBM P-TECH Testimonial

By Main coordinator, Liaison Manager.


sec sch testimonial.png

Secondary School testimonial

By Form teachers.


Thanks for reading my Portfolio! Have a nice day !

Navigation :
 
Find me on the web!