Loading...
Skip to Content

Welcome to Ketelsen.co

What is Ketelsen.co?

Ketelsen.co is a simple website and is nothing fancy. Its purpose is to introduce me, my hobby project, and its various parts.

What is the Goal of Ketelsen.co?

This website is not a blog. It is a hobby and maybe a passion.

Who is the Target Audience?

There are likely 2 target audiences for this website.

Why Not a Blog?

It is more like a simple collection of thoughts and ideas.

About This Website

This website allows me to use static web design and cloud technologies to build something practical.

In addition to being my personal website, this website is an experiment in basic web building techniques within a cloud environment. It is a static website which means that it uses the basic set of web building technologies. These include cloud hosting technologies, HTML, javascript, and current website technologies.
Wise people have told me that the only way to really learn the cloud is to use it and I believe this to be true. I have earned many certifications over the past few years. Using this knowledge is the best way to learn it. This website is hosted on AWS and uses many of the AWS technologies that were included in these certifications. Learn more...

Who am I?

Put simply, my experience includes: a decade as a Graphic Designer, another decade as an entreprenuer, and currently a Cybersecurity Professional.

If you are here you probably already know a little bit about me. But just in case you don't, here are the basics. I am a Cybersecurity Professional and a Programmer with over a decade of Graphic Design experience. It's an unusual combination, but I'm happy with it. Along the way, I have worked with many talented people and I have learned much.
This website is hosted on AWS. People have told me that the only way to really learn the cloud is to use it and I believe this to be true. This website is the first step towards using the cloud to accomplish a practical goal. I have earned many certifications over the past few years and this website is another attempt to use these technologies to do something cool.

Current Roles

Cybersecurity Incident Response Analyst
Cybersecurity Incident Response Analyst Best Buy • Reviewing a curated list of events and responding to those events following documented handling procedures • Operating within multiple platforms (Antimalware, Application Whitelisting, DNS, IDS, Netflow, Proxy, SIEM, and more) to enrich and provide additional context to events of interest • Utilizing internal and external resources for log and packet capture analysis • Providing regular feedback to peer teams (Technical Operations and Engineering, Incident Response, and Security Analytics) on process improvements and automation of event handling • Performing exploration of event data to identify suspicious events that should be reviewed and develop new handling procedures with peer teams
Professional Computer Science Tutor
Professional Computer Science Tutor Metro State Academic Center for Excellence • Tutored students in Python, Java, PHP, MySQL, HTML, CSS, C#, Visual Basic, DBMS, Networking, Cybersecurity, Linux, and more. • Aided students understanding of complex concepts like Data Structures, Algorithms, Multithread Concurrency, and Design Patterns. • When not busy tutoring students, I studied more advanced topics through online Computer Science courses such as Git, Splunk, Palo Alto Firewall Configuration, Data Structures, Algorithms, and more.

Active Certifications

Image Description

CompTIA Security Network Professional

Earners of the CompTIA Security Network Professional (CNSP) have the knowledge and skills required to monitor networks for threats or unauthorized users as well as analyze security risks and develop response procedures.
Image Description

CompTIA Network Vulnerability Assessment Professional

Earners of CompTIA Network Vulnerability Assessment Professional (CNVP) certification have the knowledge and skills required to scan applications and systems to identify vulnerabilities that can be used as a blueprint for improvements.
Image Description

CompTIA Security Analytics Professional

Earners of the CompTIA Security Analytics Professional (CSAP) are security analytics professional that have the ability to plan and carry out security measures to protect an organization’s computer networks and systems.
Image Description

CompTIA PenTest+

Earners of the CompTIA PenTest+ certification have the knowledge and skills necessary to perform hands-on penetration testing to identify, exploit, report, and manage vulnerabilities on a network. CompTIA PenTest+ professionals have demonstrated the hands-on ability and knowledge to test devices in new environments such as the cloud and mobile, in addition to traditional desktops and servers.
Image Description

CompTIA CySA+

Earners of the CompTIA CySA+ certification have the skills, knowledge, and ability to address security analytics, intrusion detection and response. CompTIA CySA+ analysts have demonstrated the ability to perform data analysis and interpret the results to identify vulnerabilities, threats and risks to an organization and the skills to secure and protect the systems.
Image Description

CompTIA Security+

Earners of the CompTIA Security+ certification have the knowledge and skills necessary to perform core security functions required of any cybersecurity role. CompTIA Security+ professionals know how to identify and address potential threats, attacks and vulnerabilities and they have established techniques in risk management, risk mitigation, threat management and intrusion detection.
Image Description

CompTIA Network+

Earners of the CompTIA Network+ certification have the skills needed to troubleshoot, configure, and manage wired and wireless networks found in companies around the world. CompTIA Network+ professionals have demonstrated the ability to design and implement functional networks, configure, manage, and maintain essential network devices, implement network security, and troubleshoot network problems.