0x4142 0x5353 0x4543 0x5552 0x4954 0x5900 0x0000 0x0000
penetration-test :: vuln-scan :: encrypt :: firewall :: shell :: nmap :: hacking
• system online • sec_mode: active

Abdelrahman
Wanas

Computer Engineering  |  Cyber Security

Computer Engineering student majoring in Cyber Security, passionate about protecting systems, networks, and data from cyber threats. Focused on ethical hacking, penetration testing, and security analysis. Building hands-on skills in vulnerability assessment and digital security.

profile.json — Abdelrahman Wanas
// Cybersecurity Engineer Profile
{
  "role": "Cybersecurity Engineer",
  "focus": ["Pen Testing", "Ethical Hacking"],
  "languages": ["Java", "Python", "C/C++", "Shell"],
  "hardware": "Verilog HDL / VLSI",
  "crypto": ["AES", "XOR", "Caesar"],
  "ml_tools": ["sklearn", "PyQt6", "R"],
  "university": "Alamein International University",
  "location": "Cairo, Egypt",
  "status": actively_learning()
}
abdelrahman @ sec-lab :~$
about_me.md — Abdelrahman Wanas
Abdelrahman Wanas profile photo

Abdelrahman Wanas

Student Profile
  • Computer Engineering Student @Alamein International University | Cybersecurity |Java Developer | Passionate About Technology

I’m a Computer Engineering student specializing in Cybersecurity and Network Security, with a strong passion for protecting systems, networks, and data from modern cyber threats. I focus on ethical hacking, penetration testing, and vulnerability assessment—applying both theoretical knowledge and hands-on practice to build secure and resilient systems.

Currently pursuing a Bachelor’s degree in Computer Engineering at Alamein International University, I’ve developed a solid foundation in programming, cryptography, operating systems, and network security. My experience includes working with security tools, analyzing vulnerabilities, and implementing encryption techniques such as hashing, salting, and classical ciphers to secure applications and data.

I have practical experience building real-world projects using Java and Python, including secure authentication systems, network-based applications, and database-driven platforms. Through these projects, I’ve strengthened my understanding of system design, secure coding practices, and client-server architectures.

Beyond cybersecurity, I also have experience in software development, working with object-oriented programming, relational databases, and Linux environments. This combination allows me to approach problems from both a development and security perspective—ensuring that applications are not only functional but also secure by design.

I’m actively involved in technical communities, contributing as a Cyber Security track member where I collaborate on projects, workshops, and continuous learning initiatives. I’m always exploring new tools, emerging threats, and best practices to stay up to date in the fast-evolving cybersecurity landscape.

I value clean code, practical learning, and problem-solving under real-world constraints. My goal is to build a strong career in cybersecurity and contribute to creating safer digital environments through secure systems and intelligent solutions.

Let’s connect if you’re looking for someone passionate about cybersecurity, technically driven, and committed to continuous growth and impact.

LIVE THREAT FEED
Loading security update...
01.

About

I'm a Computer Engineering student at Alamein International University, majoring in Cyber Security. My passion lies at the intersection of offense and defense — understanding how systems can be compromised in order to better protect them.

My focus spans ethical hacking, penetration testing, vulnerability assessment, and network security. I apply both theoretical knowledge and hands-on practice to build secure and resilient systems — implementing encryption techniques such as hashing, salting, and classical ciphers to protect real applications.

Beyond security, I build real-world projects in Java and Python — from chat applications and secure authentication systems to AI-driven games and machine learning pipelines. I approach every problem from both a development and security perspective, ensuring applications are not only functional but secure by design.

As a technical member of the IEEE AIU Student Branch (Cyber Security track), I collaborate with peers on workshops, emerging threat research, and applied cybersecurity challenges. Always exploring new tools and best practices to stay ahead in this fast-evolving field.

10+
Projects Built
+10
Certifications
10
Programming Languages
Java, Python, C/C++, PHP, JavaScript, Shell, SQL, R, Verilog HDL, HTML/CSS
IEEE
Member — Sec Track
02.

Skills & Expertise

🛡️
Cybersecurity
Ethical Hacking Penetration Testing Vulnerability Assessment Network Scanning
🌐
Network Security
Network Protocols System Security Digital Security Linux
🔐
Cryptography
AES Encryption Caesar Cipher XOR Cipher Hashing & Salting
💻
Programming
Java Python C / C++ Shell Scripting HTML / CSS / JS PHP
⚙️
Hardware Design
Verilog HDL Digital Logic VLSI Design
🤖
Data & ML
scikit-learn Pandas Matplotlib PyQt6 R RDBMS / SQL
Toolchain
Linux Bash Git Java Python C / C++ Wireshark nmap SQL HTML / CSS / JS
03.

Projects

Secure Authentication System
Java · Crypto
Secure user authentication implementing hashing, salting, and encryption techniques to protect credentials against common attacks. Features login, registration, and session management with a focus on cybersecurity best practices.
Cryptography Hashing Session Mgmt Java OOP
Chat Application
Java
Real-time chat application over a network using socket programming. Implements a client-server architecture with support for multiple concurrent users and secure message transmission.
Socket Programming Client-Server Networking Concurrency
Simple Encryption Tool
Java · Crypto
Command-line encryption tool applying classical and modern cipher techniques — Caesar, XOR, and substitution ciphers — to encrypt and decrypt text. Demonstrates core cryptographic concepts through hands-on implementation.
Caesar Cipher XOR Substitution CLI Tool
Customer Churn & LTV Prediction
Python · ML
ML project predicting customer churn and estimating lifetime value using classification and regression models. Applies data preprocessing, feature engineering, and model evaluation on real-world business datasets.
scikit-learn Feature Engineering Classification Regression
E-Learning Platform
Java
Full-featured e-learning management system allowing instructors to create courses and students to enroll, track progress, and access learning materials. Built with OOP design for scalable course and user management.
Java OOP LMS Database MVC
Hospital Patient Management
Java
Hospital management system tracking patient records, appointments, doctor assignments, and medical history in a structured database with role-based access for hospital staff and administrators.
RDBMS Role-Based Access Data Integrity
Academic Advising System
Java
Academic advising system helping students plan course schedules based on prerequisites, credit hours, and degree requirements. Automates the advising workflow to reduce manual effort and minimize scheduling conflicts.
Scheduling Automation Java
04.

GitHub Stats

GitHub overall statistics
Top GitHub languages
GitHub contribution graph
05.

Experience

Aug 2025 — PresentCairo, Egypt
Technical Member — Cyber Security Track
IEEE AIU Student Branch
  • Contributing to the Cyber Security track as an active technical member within the IEEE AIU Student Branch.
  • Collaborating with peers on cybersecurity projects, workshops, and hands-on learning activities.
  • Applying knowledge of network security, ethical hacking, and vulnerability assessment in a team environment.
  • Staying current with emerging cybersecurity threats, tools, and industry best practices.
Workshops & community: Contributing to hands-on sessions, peer learning, and applied security challenges with the IEEE AIU Cyber Security track — from tool familiarity to collaborative project work.
B.Sc. Computer Engineering
Alamein International University
Major: Cyber Security  |  Alamein, Egypt  |  Aug 2023 — Present
MAJOR
CYBER SECURITY
06.

Certifications

Digital System Design using Verilog HDL
Open ↗
Introduction to Probability and Data with R
Open ↗
Introduction to R: Basic R Syntax
Open ↗
Programming for Everybody (Getting Started with Python)
Open ↗
Ordered Data Structures
Open ↗
Hands-on Introduction to Linux Commands and Shell Scripting
Open ↗
Java Object Basics: Functions, Recursion, and Objects
Open ↗
Object-Oriented Java: Inheritance and Encapsulation
Open ↗
Fundamentals of Digital Design for VLSI Chip Design
Open ↗
Machine Learning for All
Open ↗
Introduction to Relational Databases (RDBMS)
Open ↗
07.

Contact

Open to internships, collaborations, and opportunities in cybersecurity. Whether you want to talk about ethical hacking, a project, or just connect — my inbox is open.

status_check.sh
$ whoami
abdelrahman_wanas
$ cat availability.txt
✓ Open to Internships
✓ Open to Collaborations
✓ Available for Projects
$ cat location.conf
Cairo, Egypt 🇪🇬
$ echo $STATUS
ACTIVELY_SEEKING_OPPORTUNITIES
$