Infrastructure & Systems

Infrastructure & Systems Administration Labs

Infrastructure Laboratory Overview

This section documents the design, configuration, and troubleshooting of enterprise systems across Windows, Linux, cloud, and virtualized environments.

Labs focus on system hardening, access control enforcement, network configuration, and infrastructure troubleshooting, with an emphasis on identifying and resolving misconfigurations.

All configurations are validated to confirm expected system behavior and security control effectiveness.

Lab Distribution Summary

Category Labs
Technical Foundations 7
Windows Systems Administration 7
System Administration & Maintenance 3
Troubleshooting & System Diagnostics 8
Linux Systems Administration 2
Virtualization & Infrastructure 7
Lab Demonstrations (Hands-On Execution) 29
Managed Operations & Automation 4
Total Labs Documented 66

🧠 Technical Foundations

These reports build core system knowledge required for system administration and security work. The focus is on how hardware, memory, and data processing function at a low level, and how misconfiguration or failure at this layer impacts system stability and security.

The goal is to understand how systems actually operate under the hood, so issues can be diagnosed, performance can be optimized, and security controls can be applied with context rather than guesswork.

REPORT – Introduction to Computer Hardware and Processing – v1.0.0

Breakdown of how CPU, memory, and storage interact to process data, including how instructions are executed and how system performance is affected at the hardware level.

Skills: Hardware Fundamentals · Data Processing · System Architecture

View Report

REPORT – Binary Systems, Data Representation and Logic Gates – v1.0.0

Explains how binary data is represented, processed, and transformed using logic gates, forming the foundation for all system operations and software execution.

Skills: Binary Conversion · Data Encoding · Logic Gates · System Analysis

View Report

REPORT – Computer Hardware and Power Infrastructure – v1.0.0

Examines how power is delivered across system components, including PSU behavior, motherboard communication, and risks related to improper power distribution or hardware mismatch.

Skills: Hardware Fundamentals · Power Management · System Infrastructure · Connector Interfaces

View Report

REPORT – Memory Architecture and RAM Technologies – v1.0.0

Analysis of memory architecture, including DRAM operation and DDR evolution, with focus on how memory performance and misconfiguration impact system stability and reliability.

Skills: Memory Architecture · RAM Technologies · Hardware Analysis · System Performance Optimization

View Report

REPORT – Storage Systems and Data Management – v1.0.0

Compares storage technologies such as HDD, SSD, and NVMe, including performance characteristics, failure risks, and data protection strategies to maintain integrity and availability.

Skills: Storage Systems · Data Management · Backup Strategy · Infrastructure Planning

View Report

REPORT – BIOS, UEFI, and System Boot Architecture – v1.0.0

Technical analysis of the system startup process from power on through firmware execution, hardware checks using Power On Self Test, boot device selection, and operating system loading.

Skills: Firmware Systems · Boot Process · Hardware Diagnostics

View Report

REPORT – Operating System Fundamentals and System Operations – v1.0.0

Explores how operating systems manage hardware, processes, memory, and storage, including kernel operations, virtual memory, file systems, and system logs used for monitoring and troubleshooting.

Skills: Operating Systems · Process Management · Virtual Memory · File Systems · System Monitoring

View Report

Windows Systems Administration

🛡️ Endpoint Security & Configuration Enforcement

SOP – Hardening Windows Defender Using Local GPO – v1.0.1

Configured Windows Defender using Local Group Policy to enforce real-time protection and standardized endpoint security settings.

Skills: Endpoint Protection · Windows Defender · GPO Enforcement

View Report

SOP – Anonymous Access Restriction & Recon Hardening – v1.0.2

Restricted null sessions and anonymous enumeration to reduce information exposure and prevent reconnaissance-based attacks.

Skills: Information Leakage Prevention · System Hardening · Access Control

View Report

REPORT – OS Patching Enforcement via Local GPO – v1.0.0

Configured automated patching policies using Local Group Policy to maintain system updates and reduce vulnerability exposure.

Skills: Patch Management · Policy Enforcement · System Maintenance

View Report

REPORT – Hardening Microsoft Edge via Local GPO – v1.0.0

Applied Group Policy settings to secure Microsoft Edge by restricting extensions, downloads, and unsafe browser behavior.

Skills: Browser Hardening · Web Security · GPO Configuration

View Report

REPORT – Deploy Controlled Folder Access via Local GPO – v1.0.0

Implemented Controlled Folder Access to block unauthorized applications from modifying protected directories.

Skills: Ransomware Protection · Data Integrity · Endpoint Hardening

View Report

REPORT – Endpoint Security with Windows Registry – v1.0.0

Configured registry-based security controls to restrict untrusted activity and enforce system-level access policies.

Skills: Registry Hardening · Endpoint Security · Access Control

View Report

REPORT – GPO Hardening for Windows Application Control – v1.0.0

Enforced application control using Group Policy to block unauthorized software execution and reduce attack surface.

Skills: Application Control · Threat Surface Reduction · GPO Enforcement

View Report

🪟 Windows GPO / System Hardening

REPORT – Hardening Windows User Rights via Local Group Policy – v1.0.0

Configured User Rights Assignment policies to enforce least privilege and restrict high-risk system permissions.

Skills: Least Privilege · Access Control · Identity Security · GPO Enforcement

View Report

REPORT – Applying a Local GPO for Session Lock Enforcement – v1.0.0

Configured session lock policies via Group Policy to automatically secure inactive user sessions.

Skills: Session Security · Endpoint Protection · GPO Enforcement

View Report

REPORT – Deploy Local GPO for Windows Security Policies – v1.0.0

Configured Local Group Policy to enforce baseline Windows security configurations.

Skills: GPO Engineering · Baseline Hardening · Endpoint Security

View Report

SOP – Password & Account Lockout GPO Hardening – v1.0.1

Configured password policies and account lockout thresholds to strengthen authentication controls and prevent unauthorized access.

Skills: Password Policy · Account Lockout · Authentication Security · GPO Enforcement

View Report

REPORT – Hardening UAC via Local Group Policy – v1.0.0

Configured User Account Control settings to reduce unauthorized privilege escalation.

Skills: UAC Hardening · Privilege Security · Access Control

View Report

REPORT – Hardening Credential Entry Using Group Policy – v1.0.0

Configured Secure Desktop and logon restrictions to reduce credential exposure and prevent interception.

Skills: Credential Security · Logon Hardening · Access Control · GPO Enforcement

View Report

👁️ Endpoint Monitoring

REPORT – Monitoring Windows Processes with Procmon – v1.0.1

Used Process Monitor to capture system activity, analyze process behavior, and investigate file and registry interactions.

Skills: Security Monitoring · Process Analysis · Sysinternals · Event Analysis

View Report

⚙️ System Administration & Maintenance

REPORT – Windows Disk Management with CHKDSK and FSUTIL – v1.0.0

Used built-in Windows tools to check disk health, repair filesystem errors, and validate storage integrity.

Skills: Disk Management · Filesystem Repair · Storage Integrity · System Maintenance

View Report

REPORT – Windows Control Panel Administration – v1.0.0

Configured Control Panel settings to manage system features, enforce restrictions, and support administrative tasks.

Skills: System Configuration · Administrative Control · Windows Management

View Report

GUIDE – Windows System Administration Labs (11 Modules) – v1.0.0

Structured collection of Windows administration labs covering system configuration, operational tasks, and troubleshooting across multiple scenarios.

Skills: Windows Administration · System Configuration · Troubleshooting · Environment Management

View Report

🔍 Troubleshooting & System Diagnostics

REPORT – USB Storage Failure Analysis and Disk Validation – v1.0.0

Diagnosed USB storage instability by validating filesystem integrity and identifying whether failures originated from corruption or hardware defects.

Skills: Hardware Diagnostics · Disk Validation · CHKDSK · Root Cause Analysis

View Report

REPORT – USB Filesystem Corruption Due to Improper Removal – v1.0.0

Identified filesystem corruption caused by unsafe USB removal during active operations, leading to data integrity failure.

Skills: Filesystem Troubleshooting · Disk Management · Data Integrity · Root Cause Analysis

View Report

REPORT – Restore USB Access on a Windows 10 VM – v1.1.0

Resolved USB passthrough failure in a virtual environment by configuring VirtualBox USB filters and validating device and filesystem functionality.

Skills: Virtualization · USB Passthrough · Disk Management · CHKDSK · Root Cause Analysis

View Report

REPORT – Hardware Integrity Investigation: 2TB USB I/O Failure – v1.0.0

Investigated persistent I/O failures in a 2TB USB device, isolating hardware controller faults from software and virtualization-related issues.

Skills: Hardware Diagnostics · Root Cause Analysis · Cross-Platform Troubleshooting

View Report

REPORT – USB Passthrough Instability in VirtualBox (Kali Linux) – v1.0.0

Diagnosed and resolved USB passthrough instability in a Kali Linux virtual machine by stabilizing host-to-guest communication and enforcing secure filesystem controls.

Skills: Virtualization · USB Troubleshooting · Root Cause Analysis

View Report

REPORT – Workstation Power Failure Investigation – v1.0.0

Diagnosed system instability caused by insufficient power supply capacity after hardware upgrades, restoring stable system operation.

Skills: Hardware Diagnostics · Power Load Analysis · Root Cause Analysis · System Stability

View Report

REPORT – Troubleshooting Remote Access and Network Isolation – v1.0.0

Resolved Remote Desktop failures by identifying Group Policy conflicts and implementing a dual-homed network design for secure administrative access.

Skills: RDP Troubleshooting · Group Policy · Network Isolation · Access Control · Root Cause Analysis

View Report

REPORT – Domain Controller NAT & Routing – v1.0.3

Configured a Domain Controller as a NAT gateway and DNS server, identifying and resolving a duplicate IP conflict that disrupted network routing.

Skills: Network Troubleshooting · NAT Configuration · Active Directory · Routing · ESXi

View Report

🐧 Linux Systems Administration

Administration and hardening of Linux-based systems, including user management, access control enforcement, system processes, and log analysis within server environments.

REPORT – SAR Performance Monitoring on Ubuntu – v1.0.1

Monitored CPU, memory, and I/O activity using SAR to identify performance patterns and support system diagnostics on Ubuntu systems.

Skills: System Monitoring · Performance Analysis · Linux Diagnostics

View Report

REPORT – Linux File Permissions Management – v1.0.0

Configured file and directory permissions using chmod, chown, and chgrp to enforce controlled access and prevent unauthorized modification.

Skills: Linux Permissions · Access Control

View Report

📁 Local File & Permission Security

REPORT – File Ownership Recovery – v1.0.0

Restored correct file ownership to resolve access issues and re-establish proper permission control within a Linux environment.

Skills: File System Permissions · Linux Administration · Access Control · Troubleshooting

View Report

🐧 Linux Endpoint Security & Admin Controls

SOP – Secure Linux Management with Cockpit – v1.0.1

Configured and secured Cockpit to enable controlled, browser-based system management while reducing exposure of administrative services.

Skills: Linux Administration · Server Management · Access Control

View Report

REPORT – Webmin Secure Administration (Dual-Homed) – v1.1.0

Deployed and secured Webmin within a dual-homed architecture to isolate administrative access and reduce exposure of management interfaces.

Skills: Linux Service Management · System Configuration · Network Segmentation

View Report

REPORT – GVM Deployment and Hardening on ARM64 Kali Linux – v1.1.0

Deployed and hardened Greenbone Vulnerability Management (GVM) on ARM64 Kali Linux, configuring services and securing the platform to support controlled vulnerability scanning operations.

Skills: Vulnerability Management · Linux Hardening · Service Configuration · Security Operations

View Report

REPORT – Linux System Administration Commands – v1.0.0

Applied core Linux command-line tools to monitor processes, troubleshoot system issues, and manage system resources in a controlled environment.

Skills: Linux CLI Administration · Process Monitoring · System Diagnostics · Troubleshooting

Request Access

🌐 Virtualization & Infrastructure

Design and deployment of virtualized environments used to support secure system administration, testing, and infrastructure validation across isolated lab environments.

REPORT – VirtualBox Network Modes – v1.0.0

Configured and validated VirtualBox networking modes including NAT, Bridged, Host-Only, and Internal to support isolated and controlled lab environments.

Skills: Virtual Networking · Lab Infrastructure · Network Configuration

Request Access

REPORT – System Administration Virtualization in Cybersecurity – v1.0.1

Designed and implemented virtualized environments to support isolated system administration tasks and cybersecurity testing workflows.

Skills: Virtualization · Lab Architecture · Security Testing Environments

Request Access

REPORT – Enterprise Hybrid-Cloud Migration – v1.2.0

Migrated VMware virtual machines to AWS EC2 and resolved kernel driver conflicts from the AWS Application Migration Service, restoring system compatibility and functionality.

Skills: Cloud Migration · AWS EC2 · Troubleshooting · Infrastructure Runbooks

View Report

GUIDE – vSphere 8 Nested Lab on AMD Ryzen 5 6600H – v1.0.0

Built a nested virtualization lab using VMware vSphere 8, configuring ESXi hosts and virtual networking to simulate enterprise infrastructure.

Skills: Nested Virtualization · VMware vSphere · Lab Deployment · Infrastructure Configuration

View Report

GUIDE – UTM Kali Linux Shared Folder Configuration – v1.0.0

Configured shared folder integration between host and Kali Linux VM, enabling secure file transfer and controlled data access.

Skills: Virtualization · Linux VM Management · File Integration

View Report

GUIDE – GCP Windows 10 VM Deployment – v1.0.0

Deployed and configured a Windows 10 virtual machine in GCP, including network setup, secure access configuration, and system initialization.

Skills: GCP · Cloud Infrastructure · VM Deployment · Remote Access Configuration

View Report

GUIDE – Cybersecurity Virtualization Labs (VMware, WSL, GCP, AWS) – v1.0.0

Designed and managed multi-platform virtualization labs across VMware, WSL, GCP, and AWS to support cybersecurity testing and system administration workflows.

Skills: Virtualization · Multi-Cloud Environments · Lab Architecture · Infrastructure Design

View Report

Lab Demonstrations

🏗️ Virtualization & Infrastructure Labs

LAB – VMware ESXi and vSphere VM Deployment and Network Connectivity Test – v1.0.0

Deployed and configured ESXi hosts and vSphere-managed virtual machines, validating network connectivity across virtualized systems.

Request Access

LAB – Virtual Machine Snapshot Creation for System Rollback – v1.0.0

Created and managed VM snapshots to enable safe rollback during system changes and testing scenarios.

Request Access

LAB – VMware Fusion VM Deployment and Inter-VM Network Connectivity – v1.0.0

Provisioned virtual machines in VMware Fusion and validated inter-VM communication across configured virtual networks.

Request Access

LAB – Windows Subsystem for Linux Installation and Configuration – v1.0.0

Installed and configured Windows Subsystem for Linux (WSL) to enable integrated Linux operations within a Windows environment.

Request Access

LAB – Two-VM Virtualized Cybersecurity Lab Environment – v1.0.0

Designed and deployed an isolated two-machine lab environment to simulate attacker and target systems for controlled security testing.

Request Access

LAB – Setting Up a Secure Software Development Environment – v1.0.0

Configured a secure development environment with essential tools, runtimes, and controls to support secure coding and system development workflows.

Request Access

☁️ Cloud Infrastructure Labs

LAB – AWS EC2 Virtual Machine Deployment and Secure SSH Access – v1.0.0

Provisioned EC2 instances within AWS, configured Security Groups, and validated secure SSH access to ensure controlled remote administration.

Request Access

LAB – GCP Compute Engine Virtual Machine Deployment and SSH Access – v1.0.0

Deployed Compute Engine virtual machines within GCP, configured VPC networking, and validated SSH access for secure system management.

Request Access

LAB – Windows 10 VM on Google Cloud Platform (GCP) – v1.0.0

Deployed and configured a Windows 10 virtual machine in GCP, including remote desktop access, network configuration, and system initialization for administrative use.

View Lab

🐧 Linux Administration & Security Labs

LAB – Linux Command-Line Exploration and Documentation Lookup – v1.0.0

Utilized built-in documentation tools (man, cat) to analyze command syntax, options, and usage for effective system administration.

LAB – Linux User and Group Management – v1.0.0

Managed user and group lifecycles including account creation, privilege assignment, ownership control, and secure account removal.

LAB – File Discovery and Analysis in Linux – v1.0.0

Performed file discovery and analysis using command-line tools to support system investigation and log review tasks.

LAB – Linux File and Directory Management – v1.0.0

Executed file and directory operations including creation, modification, movement, and deletion within a Linux filesystem.

LAB – Linux File Permission and Directory Access Control – v1.0.0

Configured file permissions and directory access controls to enforce user and group-based security policies.

LAB – Linux Log and Data Filtering with grep – v1.0.0

Analyzed system and application logs using grep to filter, extract, and investigate relevant operational data.

LAB – Linux Firewall Configuration with Shorewall – v1.0.0

Configured Shorewall to manage Netfilter rules, control network traffic, and enforce host-level firewall policies.

Request Access

LAB – Linux Performance Monitoring with SAR (sysstat) – v1.0.0

Collected and analyzed real-time and historical system performance metrics using SAR for system diagnostics and capacity monitoring.

Request Access

LAB – Linux System Administration with Cockpit – v1.0.0

Configured and used Cockpit for web-based system administration, service management, and system health monitoring.

Request Access

LAB – Secure Linux Administration with Webmin – v1.0.0

Deployed and managed Webmin for centralized administration of users, services, and system configurations.

Request Access

🪟 Windows System Administration Labs

LAB – Setting Up a Computer for Network Integration – v1.0.0

Configured a Windows workstation for integration into a business network, including system setup, connectivity validation, and baseline configuration.

LAB – Joining a Windows Workstation to a Domain – v1.0.0

Joined a Windows system to an Active Directory domain to enable centralized authentication, policy enforcement, and enterprise system management.

LAB – Analyze Windows Processes with Procmon – v1.0.0

Used Process Monitor to capture and analyze real-time registry, file system, and process activity for system diagnostics and investigation.

Request Access

LAB – Secure Credentials with a Password Manager – v1.0.0

Implemented credential management best practices using a secure password manager to protect authentication data and reduce risk exposure.

Request Access

LAB – Use Registry to Restore File Ownership – v1.0.0

Restored file ownership and access permissions using direct Windows Registry modifications to recover control over restricted system files.

Request Access

LAB – Block SMB Access with Windows Firewall – v1.0.0

Configured Windows Firewall rules to block SMB traffic and reduce lateral movement risk across networked systems.

Request Access

🛡️ Windows Administration & Hardening (GPO) Labs

LAB – Enforce Session Locks via GPO – v1.0.0

Configured idle session lock policies to reduce unauthorized physical access risk on unattended endpoints.

Request Access

LAB – Secure WinRM Configuration via GPO – v1.0.0

Hardened Windows Remote Management by enforcing encrypted communication and restricting remote access exposure.

Request Access

LAB – Windows Defender Hardening via GPO – v1.0.0

Configured advanced Defender controls, including real-time protection and cloud-based threat detection, to strengthen endpoint defense.

Request Access

LAB – Deployed Exploit Guard via GPO on Windows 10 – v1.0.0

Enabled Attack Surface Reduction (ASR) rules and memory protection controls to reduce exploitability and limit attack vectors.

Request Access

⚙️ Managed Operations & Automation Labs

Utilizing advanced Windows management tools to automate recurring maintenance tasks, monitor system health, and secure data-at-rest.

🔐 Data Security

Planned and deployed BitLocker Drive Encryption to protect sensitive data-at-rest and reduce risk of data exposure from device loss or theft.

🤖 Automation

Automated recurring system maintenance and cleanup tasks using Task Scheduler to improve operational efficiency and reduce manual workload.

🛠️ Diagnostics

Analyzed system and security event logs using Event Viewer to identify anomalies, troubleshoot issues, and support incident investigation.

🛡️ Network Hardening

Configured host-based firewall rules to restrict unauthorized traffic and reduce exposure to network-based attacks.


Portfolio Documentation

This section represents applied infrastructure engineering across operating systems, virtualization platforms, and cloud environments. Each lab reflects hands-on configuration, security enforcement, and system validation aligned with operational and security requirements.

While selected projects are presented here, they are supported by a larger archive of structured reports, lab documentation, and system configuration records maintained within a private research repository.

Additional documentation is available upon request for professional or technical review.