IoT Smartphone Application Analysis of GoatDroid
This document relates to the objective by using QARK, an automated security tool, to analyze Android applications for vulnerabilities. The process involved scripting and running automated scans that detected cross-site scripting (XSS) flaws within the app’s WebView components. It demonstrates automation in vulnerability assessment, code analysis, and reporting, which aligns directly with the objective of scripting and documenting a security analysis process.
Click Image to Download
IoT Smartphone Application Analysis of iGoat-Swift
This document connects to the objective through the implementation of the MobSF framework within a Docker environment to automatically test iOS applications for vulnerabilities. It demonstrates automated static analysis and security auditing by scanning code for memory corruption flaws and insecure configurations. The report includes steps to set up, run, and interpret the automated tool results—fulfilling the objective of constructing and documenting a security assessment automation process.
Click Image to Download
Integrating Multiple AWS Services in a Project
This project supports the objective through the automation of deployment and management tasks using Amazon’s cloud services. By integrating EC2, RDS, and S3, it reflects how scripts and configuration management tools can automate system administration, resource mapping, and updates. The setup of web hosting and security configurations illustrates how automated infrastructure management enhances scalability and security in cloud environments.
Click Image to Download
Construct, implement and document a script or a program to automate a security-related process or other tasks such as installation, administration, management, mapping resources, logon scripts, patch management, updates, auditing, analysis and assessment.



