
I’m Samuel Kanui, a passionate and driven Software Developer with a strong foundation in cybersecurity, full-stack web development, mobile app development, and blockchain technology. I’m pursuing a Bachelor of Science in Software Engineering at Zetech University, combining academic knowledge with hands-on project experience.
My technical skills include HTML, CSS, JavaScript, Python, and PHP, and I work confidently with frameworks like Laravel and WordPress. I’ve built several real-world projects, including an Order Management System, a Personal Blog Platform, a Business E-commerce Website, a mobile app, and even blockchain-based solutions—all focused on usability, performance, and security.
I hold certifications in CCNA Routing & Switching, CCNA Wireless, and Industrial Security Oversight (ISOC), which have deepened my understanding of secure systems and networks. I’m also experienced with MySQL, MS-SQL, GitHub, and Ubuntu OS.
I’m a creative problem-solver who thrives in collaborative environments, and I’m always looking to learn and grow. My goal is to secure a Junior Software Developer role where I can apply my skills, build innovative solutions, and continue pushing the boundaries of what technology can do.
📧 lintasan2098@gmail.com
🔗 linkedin.com/in/samuel-kanui-93488024a
Work Availability
- contract
Credentials from
Internet Society DirectoryMay 26, 2025
May 26, 2025
Encryption Certificate 
Encryption Certificate
- Describe encryption concepts at a high level, and the benefits encryption offers to us individually and as a society.
- Find out why it is important, and the ways in which we rely upon strong encryption in our daily lives.
- Understand how and why efforts to weaken encryption pose a serious threat.
- Learn about various “backdoor access” proposals and why they are problematic.
- Learn about the Internet Society’s goals and activities related to supporting strong encryption and defending against threats to it.
- Discover what actions you can take to advocate for strong encryption in your community and beyond.
May 11, 2025
May 11, 2025
Encryption in Use 
Encryption in Use
- Data in transit
- End-to-end encryption
- Link layer security
- Transport layer security
May 11, 2025
May 11, 2025
Advocacy for Encryption 
Advocacy for Encryption
- Encryption advocacy
- How to become an encryption advocate
- Structuring advocacy messaging by audience
May 11, 2025
May 11, 2025
History of Encryption Practices 
History of Encryption Practices
- Evolution of encryption practices
- Government involvement in encryption
- Back-door access to encrypted products
May 11, 2025
May 11, 2025
Threats to Encryption 
Threats to Encryption
- Types of threats to encryption
- Methods that enable access to encrypted data
- Methods that involve access to users’ data before encryption or after decryption
May 11, 2025
May 11, 2025
What is Encryption? 
What is Encryption?
- Encryption definition
- How encryption protects your data
- Symmetric and asymmetric encryption
- End-to-end encryption communication