Projects & Portfolio

Database & Business Intelligence

With proficiency in SQL, PL/SQL, T-SQL, and IBM Cognos, I optimize database structures and queries to improve performance and data retrieval efficiency. My experience in data analytics and business intelligence allows me to transform raw datasets into actionable insights, empowering organizations to make informed decisions.

Certified Cybersecurity & Network Security

Holding certifications such as CCNA, CCNP, CompTIA Security+, and Cisco Cybersecurity Certificate, I specialize in securing IT infrastructure, implementing risk mitigation strategies, and ensuring compliance with industry standards such as HIPAA and ISO 27001.

Innovative Problem Solving & Technical Leadership

I thrive in cross-functional environments, collaborating with security analysts, developers, and executives to align technology solutions with business objectives. Whether designing secure software, optimizing cloud security, or leading data-driven initiatives, I am committed to driving innovation and delivering technical excellence.

Dynamic Fifteen Puzzle Game

(HTML, CSS, JavaScript)

Designed and developed a browser-based Fifteen Puzzle Game featuring tile shuffling, animated movements, a cheat-solve algorithm, win detection, and customizable levels. Integrated dynamic background music, sound effects, and player score tracking, with support for multiple puzzle sizes and themes. Deployed and tested the game on GSU’s Codd server with in-teractive user feedback and bug tracking.

Healthiest Salad Website

This project is a fully responsive recipe website showcasing the world's healthiest foods, built entirely using HTML, CSS, and vanilla JavaScript. I designed the layout with accessibility and mobile-first principles in mind, added image optimization for performance, and implemented smooth CSS-based sliding effects for featured photos.

https://ahmedalaboodi83.github.io/healthiest-salad-site/recipe.html

GTSC Donations

This is a simulated phishing site created for a cybersecurity class at Georgia Tech.

It’s meant to show how fake login or donation pages can be used to trick people. Please don’t enter any real info this is for educational purposes only and nothing is stored.
Purpose:
Raise awareness of phishing tactics
Show how easy it is to spoof real websites
Promote safer online habits


https://gtscdonations.tech

Baby Bud – Baby Care Alert & Tracker System

Full-Stack Baby Safety Tracker

Built a complete baby care and alert system using Python, Tkinter, and Firebase. Features include GPS tracking via Google Maps API, secure login with Firebase Auth, baby check-in/out, car registration, and custom audio/image alerts. Integrated real-time location display, alarm scheduling, and cloud data storage into one GUI-based solution focused on usability and safety.

Phone Number Tracker with Location & Spam Detection

Developed a Python-based phone number tracker that identifies the country, region, carrier, timezone, and validity of any global phone number using the `phonenumbers` and `geopy` libraries. The tool also includes a basic spam detection feature and generates a Google Maps link for approximate location visualization based on region data.

This project is designed to demonstrate real-world usage of Python for data parsing, API integration, geographic analysis, and data logging. It includes:

- Real-time input handling

- Scam/spam flagging (mocked, API-ready)

- Google Maps integration using geolocation

- Logging of number lookups into CSV

- CLI-based interface for portability

- Modular and extensible architecture

github.com/ahmedalaboodi83/phone-number-tracker](https://github.com/ahmedalaboodi83/phone-number-tracker

Cybersecurity Projects

Showcasing Ahmed's key contributions and technical expertise in cybersecurity.

A chaotic chalkboard filled with various symbols, numbers, and text related to hacking. Words like 'HACKER', 'ATTACK', and 'UPLOAD' are prominently visible amidst a jumble of codes and cryptic symbols. The board conveys an atmosphere of mystery and complexity, reminiscent of a hacker's workspace.
A chaotic chalkboard filled with various symbols, numbers, and text related to hacking. Words like 'HACKER', 'ATTACK', and 'UPLOAD' are prominently visible amidst a jumble of codes and cryptic symbols. The board conveys an atmosphere of mystery and complexity, reminiscent of a hacker's workspace.

Man-in-the-Middle (MITM)

Analyzed Layer 2–7 network traffic using Wireshark and PyShark to detect and interpret man-in-the-middle (MITM) attack patterns in real packet capture (PCAP) data. Leveraged network protocol analysis techniques to identify suspicious behaviors such as credential interception, unauthorized data transfers, and IRC communication. Developed Python scripts to automate traffic parsing and flag anomalous activity across multiple sessions. Strengthened skills in packet-level analysis, threat detection, and secure communication protocols.

Machine Learning in Cybersecurity

Python, scikit-learn, Pandas

Designed, trained, and deployed advanced classification models on real-world threat-intelligence datasets to automate de-tection workflows, improving identification accuracy and reducing mean time to detect threats.