These projects are a tangible demonstration of some of the skills I offer to organizations as an information security specialist. Learn more about me at my professional website.
π΄ Active Directory Penetration Testing and Red Teaming Homelab
test test test
π΄ Cloud Reconnaissance and Enumeration in Azure, AWS, and GCP
test test test
π΄ Web Penetration Test and Threat Assessment
test test test
π΄ Professional OSINT Investigation and Report with Social Engineering
test test test
π΄ Capstone: AI-Enhanced Red Team Engagement
test test test
π£ Threat Hunting Scenario 1
test test test
π£ Threat Hunting Scenario 2
test test test
π’ Vulnerability Management Program Implementation
test test test
π’ Vulnerability Remediation Automation 1
test test test
π’ Vulnerability Remediation Automation 2
test test test
π΅ Python Security Automation Toolbox
test test test
π΅ Network Engineering, Administration, and Security Homelab
test test test
π΅ Designing, Administering, and Securing a Website with Cloudflare
test test test
π΅ Defend against cyberthreats with Microsoft Defender XDR
Configured a Defender XDR environment, managed devices by using Defender for Endpoint, used Defender XDR to manage incidents, managed investigations on an endpoint, and performed Advanced Hunting with KQL to detect unique threats.
π΅ Implement information protection and data loss prevention in Microsoft Purview
Created a custom sensitive information type, created and published a sensitivity label, created and assigned an auto-labeling policy, and created a data loss prevention (DLP) policy.
π΅ Implement retention, eDiscovery, and Communication Compliance in Microsoft Purview
Created and configured retention labels, applied retention labels, created and managed retention policies, created and configured eDiscovery (Premium) cases, implemented Communication Compliance, and monitored and investigated data and activities by using Content Search.
π΅ Prepare security and compliance to support Microsoft 365 Copilot
Prepared Microsoft 365 environment to support Copilot for Microsoft 365, configured identity governance to support Copilot for Microsoft 365, configured device management to support Copilot for Microsoft 365, configured and managed compliance settings for Copilot for Microsoft 365, and configured and managed access to information by Copilot for Microsoft 365.
π΅ Configure secure access to your workloads using Azure networking
Created and configured virtual networks, configured network routing, created DNS zones and configured DNS settings, created and configured network security groups (NSGs), and created and configured Azure Firewall.
π΅ Secure storage for Azure Files and Azure Blob Storage
Created and configured a storage account, created and configured Blob Storage, created and configured Azure Files, configured encryption, and configured networking for storage.
π΅ Administer Active Directory Domain Services
Deployed and managed AD DS domain controllers, configured Active Directory topology, created and managed AD DS objects, created and configured Group Policy Objects (GPOs) in AD DS, managed security in AD DS.
π΅ Deploy and administer Linux virtual machines on Microsoft Azure
Created and configured a Linux VM, configured monitoring and backup of Linux VMs, scaled Linux VMs vertically, configured identities and roles for Linux VMs, and accessed Azure Storage from a Linux VM.
π΅ Capstone: Secure Network Infrastructure Deployment
test test test