25.10.20
This website uses cookies to ensure you get the best experience on our website. Learn more
I’m Samuel Kanui, a passionate and driven Software Developer with a strong foundation in cybersecurity, full-stack web development, mobile app development, and blockchain technology. I’m pursuing a Bachelor of Science in Software Engineering at Zetech University, combining academic knowledge with hands-on project experience. My technical skills include HTML, CSS, JavaScript, Python, and PHP, and I work confidently with frameworks like Laravel and WordPress. I’ve built several real-world projects, including an Order Management System, a Personal Blog Platform, a Business E-commerce Website, a mobile app, and even blockchain-based solutions—all focused on usability, performance, and security. I hold certifications in CCNA Routing & Switching, CCNA Wireless, and Industrial Security Oversight (ISOC), which have deepened my understanding of secure systems and networks. I’m also experienced with MySQL, MS-SQL, GitHub, and Ubuntu OS. I’m a creative problem-solver who thrives in collaborative environments, and I’m always looking to learn and grow. My goal is to secure a Junior Software Developer role where I can apply my skills, build innovative solutions, and continue pushing the boundaries of what technology can do. 📧 lintasan2098@gmail.com 🔗 linkedin.com/in/samuel-kanui-93488024a

Work Availability

  • contract

Credentials from

Internet Society Directory
May 26, 2025
May 26, 2025
Encryption Certificate
Preview image for credential Encryption Certificate
Encryption Certificate
  • Describe encryption concepts at a high level, and the benefits encryption offers to us individually and as a society.
  • Find out why it is important, and the ways in which we rely upon strong encryption in our daily lives.
  • Understand how and why efforts to weaken encryption pose a serious threat.
  • Learn about various “backdoor access” proposals and why they are problematic.
  • Learn about the Internet Society’s goals and activities related to supporting strong encryption and defending against threats to it.
  • Discover what actions you can take to advocate for strong encryption in your community and beyond.
May 11, 2025
May 11, 2025
Encryption in Use
Preview image for credential Encryption in Use
Encryption in Use
  • Data in transit
  • End-to-end encryption
  • Link layer security
  • Transport layer security
May 11, 2025
May 11, 2025
Advocacy for Encryption
Preview image for credential Advocacy for Encryption
Advocacy for Encryption
  • Encryption advocacy
  • How to become an encryption advocate
  • Structuring advocacy messaging by audience
May 11, 2025
May 11, 2025
History of Encryption Practices
Preview image for credential History of Encryption Practices
History of Encryption Practices
  • Evolution of encryption practices
  • Government involvement in encryption
  • Back-door access to encrypted products
May 11, 2025
May 11, 2025
Threats to Encryption
Preview image for credential Threats to Encryption
Threats to Encryption
  • Types of threats to encryption
  • Methods that enable access to encrypted data
  • Methods that involve access to users’ data before encryption or after decryption
May 11, 2025
May 11, 2025
What is Encryption?
Preview image for credential What is Encryption?
What is Encryption?
  • Encryption definition
  • How encryption protects your data
  • Symmetric and asymmetric encryption
  • End-to-end encryption communication