π© [email protected]
- π Master of Business Administration (MBA) in Business (4.0 GPA).
- π Master of Science (MS) in Cybersecurity and Information Assurance (4.0 GPA).
- π Bachelor of Science (B.S.) in Honors Biomedical Sciences (3.97 GPA).
- π¬ My research has been published in peer-reviewed medical journals and has been cited over 200 times.
- β Akbar, Umair, et al. Omega-3 fatty acids in rheumatic diseases: a critical review. JCR: Journal of Clinical Rheumatology.
- β Yang, M., Akbar, U. and Mohan, C., 2019. Curcumin in autoimmune and rheumatic diseases. Nutrients.
- β Ding, H., Akbar, U., Mohan, C., 2016. Promises and challenges of metabolomics in SLE. Nature Reviews Rheumatology.
- Implementing Zero Trust Architecture: An Enterprise Guide
- Apple Secure Enclave Processor
- The music I created was done by training an artificial intelligence model equivalent to around 80,000 hrs of GPU runtime via PyTorch.
- I employed neural networks to generate totally original, copyright-protected content.
- Master of Science (M.S.) in Cybersecurity and Information Assurance
- GIAC Cloud Security Automation Certification (GCSA)
- Certificate of Cloud Auditing Knowledge (CCAK)
- AWS Certified Security - Specialty (SCS-C01)
- AWS Certified Solutions Architect - Professional (SAP-C01)
- AWS Certified Solutions Architect - Associate (SAA-C02)
- Microsoft Azure Certified: Azure Solutions Architect Expert
- Microsoft Azure Certified: DevOps Engineer Expert
- Microsoft Azure Certified: Azure Administrator Associate
- Microsoft Azure Certified: Azure Security Engineer Associate
- Microsoft Azure Certified: Cybersecurity Architect Expert
- Certified Information Systems Auditor (CISA)
- Certified Ethical Hacker (CEH)
- Certified Data Privacy Solutions Engineer (CDPSE)
- Google Professional Cloud Architect
- Microsoft Cybersecurity Architect (SC-100)
- Designing Microsoft Azure Infrastructure Solutions (AZ-305)
- Designing and Implementing Microsoft DevOps Solutions (AZ-400)
- Microsoft Azure Administrator (AZ-104)
- Microsoft Azure Security Technologies (AZ-500)
- I engineer cloud-based systems that are based on these tenets:
- Resiliency - If something "goes wrong" in the code; the program is able to self-heal or continue without affecting the entire system itself.
- Highly-available - The system is ideally available at all times; the system converges towards an error-free state and is therefore self stabilizing.
- Redundancy - There will always be multiple identical instances of the system and it will switch to one of the redundant instances in case of failover.
- Efficiency - The above three cost a lot to achieve; my designs are extremely efficient. If there is too much code, complexity, both, or either, I will revert the changes and re-create the system until it is. Being efficient and having all three of the above is a requirement. Until that is achieved my work is not complete.
-
- Search results from Google delivered without advertisements, cookies, or IP address tracking and respects privacy.
-
- Minimal, lightweight, and blazing fast Hadith search engine with approrpiate links to scripture.
-
- Wordle clone made using React and Typescript JS. Deployable in one click via Netlify.
-
hakkbar - portfolio website simulating macOS Catalina's GUI powered by React + React Redux + tailwindcss.
-
whoneeds.coffee - lightweight website using the Screen Wake Lock API to prevent your device from sleeping.
-
neural networks from scratch - learn the mechanism of how and why neural networks work the way they do in an interactive, step-by-step tutorial
-
iPodJs // to do later