- Successfully hacked retrieving information
- Strategically gained access to Wi-Fi passwords
- Coded and encrypted passwords on 5 file
- Worked closely with peers to identify issues and provide suitable resolutions
- Partnered with team members to learn best practices in software design