Cyberpedia

Send message
send message to: Eng.Dalia AL-Bash
You need to write a message
Message sent Close
Eng.Dalia AL-Bash
Trainer in the red team courses(CYBERPEDIA)
1
courses
0
Eng. Dalia Al-Bash Red Team Specialist | Ethical Hacker | Threat Intelligence Analyst | IT Infrastructure Architect I am a cybersecurity professional specializing in Red Team operations, ethical hacking, threat intelligence, and secure IT infrastructure architecture. I work in high-pressure environments to build resilient systems, lead digital transformation, and teach advanced cybersecurity courses at the academic level. Academic Background Master’s in Web Sciences Syrian Virtual University — Informatics Engineering (Academic Track) 2022–2024 Master’s in Electronic Business Administration Arab Academy for Electronic Business Specialization: E-Business & Digital Transformation Graduation Project: 93% (Top Score) Bachelor’s in Information Technology Engineering Damascus University — Networks & Operating Systems Graduation Project: 88% (Top Score) Final Average: 69.45% (Good) Professional Experience Cybersecurity & Red Team Operations 2021–Present Penetration testing, threat modeling, and adversary simulation. Digital forensics, malware analysis, and threat-intelligence reporting. Development of SOC detection rules, SIEM use-cases, and incident-response workflows. Hardening of hybrid/on-prem infrastructures using Zero Trust, RBAC, NAC, and segmentation. Achieved a 35% reduction in cybersecurity incidents through proactive threat hunting. IT Infrastructure Architecture & Digital Transformation 2021–2025 Designed secure, high-availability enterprise networks (VLANs, routing, firewalling). Built backup and DR systems that reduced downtime by 40%. Migrated enterprise services to hybrid cloud with 100% data integrity. Implemented ISO 27001 controls and multiple risk analyses. Upgraded infrastructure using virtualization, containerization, and cloud orchestration. Academic Teaching Experience Syrian Private University (SPU) Lecturer: Networks (CCNA), Operating Systems. Built Linux-based lab environments with AI-aided evaluations. Trained 100+ faculty members on digital systems. Arab International University (AIU) Instructor for Network Security (ECIR, SOC-200, SOC-450), Ethical Hacking (OSCP/eJPT track), Cloud & Distributed Systems, CCNA. CYBERPEDIA — Red Team Trainer Specialized courses: Linux for Hackers, Offensive Security, Hacking the Hacker. Designed full attack–defense labs and OSINT/threat-intel exercises. Certifications (Newest → Oldest) Cybersecurity & Ethical Hacking OSCP (In Progress) ECIR – Cyber Incident Response SOC-450 – Advanced SOC Operations SOC-200 – Cyber Defense Analyst PenTest+ (PT0-002) eJPT CompTIA Security+ (SY0-601 Prep) Ethical Hacking Bootcamp Google Cybersecurity Professional Threat Hunting (Infosec) Cyber Security Specialization – University of London Ethical Hacking – Johns Hopkins Windows Security – University of Colorado International Cyber Conflict – NYU Cloud & Virtualization Microsoft Azure (AZ-900) AWS Cloud Computing Windows Server Hyper-V Networking CCNP Enterprise (350-401 ENCOR) CCNA Network+ MCSA (Microsoft Server) Data & AI IBM Data Analyst Professional Microsoft AI Fundamentals Key Projects 1. Secure Hybrid Cloud Migration Migrated enterprise infrastructure into a hybrid cloud model using Azure AD, RBAC, VPN, Zero Trust segmentation, and cloud-native SIEM integration. Outcome: 60% improvement in service availability and enhanced SOC visibility. 2. Infrastructure Modernization & Network Hardening Redesigned legacy network architecture with secure VLANs, firewall segmentation, high-availability core, NAC, SIEM, and automated configuration (Ansible). Outcome: Reduced attack surface by 45% and improved performance by 40%. 3. Cybersecurity Framework & SOC Implementation Implemented ISO-27001-aligned policies, performed risk assessments, built SOC detection logic mapped to MITRE ATT&CK, and executed red-team/purple-team cycles. 4. Smart & Secure Building Infrastructure (IoT-Ready) Designed secure IoT-based building systems including segmented networks, encrypted IP surveillance, identity-secured automation, and AI-based anomaly detection. 5. Cloud-Native Monitoring & SOC Automation Developed SIEM/SOAR pipelines (ELK + Wazuh, CloudWatch, Azure Monitor) with automated response flows for phishing, brute force, and beaconing. Outcome: 30% reduction in analyst workload.
Member since August 2025
  • Courses
  • Co-owned courses
  • Bundles
  • Reviews
Courses reviews
All ratings
  • 5 stars
  • 4 stars
  • 3 stars
  • 2 stars
  • 1 stars
Cyber Security

Linux for hackers

10 Lectures
0.0
Members Only

Linux for hackers

دورة متقدمة ومكثفة في بيئة لينكس للاختراق الأخلاقي تمنحك الانتقال من فهم عقلية الهاكر إلى خبرة عملية احترافية في بناء واختبار و...
متقدم
10 Lectures
Nothing to show yet
  • 1