Sondos Ahmad Aabed's starred repositories
simple-icons
SVG icons for popular brands
custom-icon-badges
🛡 Allows users to more easily use Octicons and their own icons and logos on shields.io badges
handwriting-generation
Implementation of handwriting generation with use of recurrent neural networks in tensorflow. Based on Alex Graves paper (https://arxiv.org/abs/1308.0850).
LSTM_Attention_redeployment_for_yahoo_stock_data
Integrating Airbyte, Kafka, Airflow and MLflow on Azure Linux VMs within private network to periodically retrain LSTM Attention model with 1-minute stock prices and redeploy it on Azure ML AKS real-time inference endpoint behind serverless Azure API
snp500_stock_prediction
S&P 500 stock price prediction using Transformer model
dockumentor
docker compose doc generator
bonjour-python
🐍 Formation Python Intégrale 🌟: Plongez dans Python depuis les bases jusqu'aux projets avancés. Clarté, pratique, et innovation au rendez-vous. Commencez votre aventure Python maintenant!
google-flan-t5-small
Training and fine-tuning flan-t5-small model based on provided text
BUTCH4BUTCH
Config files for my GitHub profile.
Exam-Scheduling-System-Backend
The Exam Scheduling System is a web application designed to simplify the process of scheduling university exams.
github-profile-views-counter
It counts how many times your GitHub profile has been viewed. Free cloud micro-service.
security_analyst_portfolio
IBM, Google and AWS cloud security certified cybersecurity specialist
Pharma-Demo
Android Application to find the nearest pharmacy, order medications online, and chat with a pharmacist
Digital-Guardian-Sondos
My cybersecurity portfolio!
Networks-and-Network-Security
By the end of this course, I developed a greater understanding of network architecture, operations, intrusion tactics, common types of network vulnerabilities and attacks, and how to secure networks. I also was introduced to common network protocols, firewalls, virtual private networks (VPNs), and system hardening practices.
Tools-of-the-Trade-Linux-and-SQL
In this course, I have explored computing skills that I will use on-the-job as a cybersecurity analyst. First, I practiced using Linux OS commonly used by cybersecurity professionals. Used the Linux command line through the Bash shell to navigate, manage the file system, authenticate users. Then, I have used SQL to communicate with a database.
Chrome-Themes
A collection of color themes made for chromium browsers