A structured collection of security reports, standard operating procedures, and technical investigations demonstrating applied cybersecurity skills across real-world scenarios.
- Security Operations 20
- Infrastructure and Systems 14
- Identity Security 12
- Networking 10
- Governance and Risk 5
- Operational Approach 4
- OSINT Investigation 3
- Operational Resilience 1
Security Operations
SOP – Secure Linux Management with Cockpit – v1.0.1
Using Cockpit to manage and secure multiple Linux systems from a single web interface.
REPORT – Webmin Secure Administration (Dual-Homed) – v1.1.0
Securing a dual-homed Webmin administration server through PAM-based authentication, interface mapping, and IP-based firewall hardening.
REPORT – pfSense IDS Traffic Monitoring and EternalBlue Detection – v1.0.0
Deployment of a pfSense firewall with Snort IDS to detect and analyze EternalBlue (MS17-010) exploitation in a lab environment.
REPORT – WinRM Secure Configuration and Validation – v1.0.0
Implementation and validation of secure Windows Remote Management (WinRM) protocols to ensure encrypted administrative communication and prevent unauthorized access.
REPORT – SMB Hardening for Credential Theft Protection – v1.0.0
Implementation of SMB signing, protocol deprecation, and session limits to protect against credential theft and relay attacks.
SOP – Hardening Windows Defender Using Local GPO – v1.0.1
Implementation of an immutable endpoint security baseline using Local Group Policy to harden Windows Defender against unauthorized modification and malware.
SOP – Anonymous Access Restriction & Recon Hardening – v1.0.2
Implementation of Local Group Policy restrictions to prevent anonymous enumeration and null session reconnaissance against Windows endpoints.
REPORT – OS Patching Enforcement via Local GPO – v1.0.0
Implementation of automated operating system patching policies via Local Group Policy to balance system security with operational availability.
REPORT – Hardening Microsoft Edge via Local GPO – v1.0.0
Implementation of security-focused Group Policy configurations to harden Microsoft Edge against web-based threats, unauthorized extensions, and data exfiltration.
REPORT – Deploy Controlled Folder Access via Local GPO – v1.0.0
Implementation of Windows Defender Controlled Folder Access via Local Group Policy to mitigate unauthorized filesystem modifications and ransomware risks.
REPORT – Endpoint Security with Windows Registry – v1.0.0
Implementation of registry-level restrictions to disallow unauthorized executable runs and harden the Windows OS against common user-mode threats.
REPORT – Monitoring Windows Processes with Procmon – v1.0.1
Utilization of Process Monitor (Procmon) to capture, filter, and analyze real-time system events for security auditing and process behavior validation.
REPORT – GVM Deployment and Hardening on ARM64 Kali Linux – v1.0.0
Deployment and stabilization of Greenbone Vulnerability Management (GVM) on ARM64, focusing on source builds and resource tuning for reliable vulnerability scanning.
REPORT – Forced Browsing Data Breach – v1.1.0
Post-incident analysis of a forced browsing attack on an e-commerce platform that exposed 50,000 customer records.
REPORT – USB Security Risk Assessment – v1.2.1
Investigation of a discovered USB device to identify potential baiting threats, data leakage, and risks to corporate infrastructure.
REPORT – Post-Breach Security Recommendations – v1.0.1
Implementation of security hardening measures and recommendations following a major data breach to improve infrastructure integrity.
REPORT – Network Attack Analysis – v1.0.1
Analysis of a TCP SYN flood attack on a public web server, including identification and mitigation strategies.
REPORT – Botium Security Audit – v1.1.0
Security audit of Botium Toys’ systems to find vulnerabilities, check compliance, and improve overall security.
REPORT – Server Security Evaluation – v1.2.0
Evaluation of a vulnerability in a publicly accessible server, focusing on risk assessment and remediation strategies.
REPORT – SQL Query Analysis Incident – v1.0.2
Use of SQL queries to investigate failed login attempts, geographic anomalies, and access patterns for security auditing.
Infrastructure and Systems
REPORT – USB Filesystem Corruption Due to Improper Removal – v1.0.0
Investigation of a corrupted external USB device following improper removal, focusing on isolating logical filesystem failure from physical hardware damage.
REPORT – Restore USB Access on a Windows 10 VM – v1.0.0
Technical resolution of USB detection failures and volume locks within a virtualized environment, including filesystem repair and stable hardware filter configuration.
REPORT – Workstation Power Failure Investigation – v1.0.0
Investigation of sudden workstation shutdowns at a law firm, identifying and remediating a physical layer failure caused by insufficient power supply capacity.
REPORT – Enterprise Hybrid-Cloud Migration – v1.2.0
A practical troubleshooting case study on migrating VMware virtual machines to AWS EC2 and resolving kernel driver removal issues from the AWS Application Migration Service.
GUIDE – vSphere 8 Nested Lab on AMD Ryzen 5 6600H – v1.0.1
A technical deep-dive into enabling nested virtualization on restricted AMD mobile platforms by bypassing OEM firmware locks and Windows 11 VBS.
REPORT – SAR Performance Monitoring on Ubuntu – v1.0.1
Implementation and analysis of system performance monitoring on Ubuntu using the System Activity Reporter (SAR) to identify resource bottlenecks and abnormal activity.
REPORT – Troubleshooting Remote Access and Network Isolation – v1.0.0
Resolution of connectivity and authentication issues between a macOS host and a Windows VM, involving Group Policy conflicts and dual-homed network design.
GUIDE – UTM Kali Linux Shared Folder Configuration – v1.0.0
Implementation of a persistent shared folder between macOS and Kali Linux using the 9p protocol within the UTM hypervisor.
REPORT – GPO Hardening for Windows Application Control – v1.0.0
Implementation of Group Policy restrictions to prevent unauthorized software installation and harden Windows endpoints against malicious downloads.
GUIDE – GCP Windows 10 VM Deployment – v1.0.0
An independent lab demonstrating deployment of a Windows 10 virtual machine on Google Cloud Platform, showcasing cloud virtualization, secure configuration, and system administration skills.
GUIDE – Windows System Administration Labs (11 Modules) – v1.0.0
A collection of 11 hands-on labs designed to build Windows administration skills, covering maintenance, troubleshooting, security, and automation — all tested in an AWS-hosted Windows 10 VM.
REPORT – Windows Control Panel Administration – v1.0.0
Implementation of system maintenance and security settings using Windows Control Panel tools to improve stability and protect data.
GUIDE – Cybersecurity Virtualization Labs (VMware, WSL, GCP, AWS) – v1.0.0
Hands-on virtualization labs across VMware, WSL, GCP, and AWS are building foundational skills for offensive and defensive cybersecurity operations.
REPORT – Linux File Permissions Management – v1.0.2
Implementation of the Principle of Least Privilege (PoLP) by managing Linux file and directory permissions to protect sensitive data.
Identity Security
REPORT – AD Disaster Recovery & Identity Restoration – v1.0.2
Successful restoration of an Active Directory environment using Bare-Metal Recovery (BMR) and System State restoration on Windows Server 2016.
REPORT – Hardening Windows User Rights via Local Group Policy – v1.0.0
Configured User Rights Assignment policies via Local Group Policy to enforce least privilege and secure Windows endpoints.
REPORT – Applying a Local GPO for Session Lock Enforcement – v1.0.0
Configured Local Group Policy to enforce automatic session locks, improving Windows endpoint security.
REPORT – Deploy Local GPO for Windows Security Policies – v1.0.0
Implementation of a comprehensive security baseline using Local Group Policy to harden Windows endpoints against common network and system-level exploits.
SOP – Password & Account Lockout GPO Hardening – v1.0.1
Implementation of mandatory password complexity and account lockout policies via Local Group Policy to defend against brute-force attacks and credential compromise.
REPORT – Hardening UAC via Local Group Policy – v1.0.0
Implementation of hardened User Account Control (UAC) settings via Local Group Policy to mitigate unauthorized privilege escalation and credential spoofing.
REPORT – Hardening Credential Entry Using Group Policy – v1.0.0
Implementation of Secure Desktop and logon restrictions via Local Group Policy to reduce the risk of credential theft and keylogging attacks.
REPORT – Password Managers – v1.0.0
Implementation of structured password management strategies to improve credential hygiene and reduce the risk of account compromise.
REPORT – File Ownership Recovery – v1.0.0
Investigation into Windows file ownership recovery methods, confirming NTFS as the authoritative source over the Registry for permission management.
REPORT – Kerberos Authentication Protocol – v1.0.0
Implementation of Kerberos authentication to improve identity verification, ticket-based security, and access control in enterprise environments.
REPORT – Investigation of Unauthorized Payroll Access Incident – v1.2.0
Investigation into unauthorized access to a payroll system using a former contractor account.
REPORT – Python Algorithm for Managing IP Access – v1.0.1
Development of a Python-based algorithm to automate IP allow list management for scalable access control enforcement.
Networking
REPORT – pfSense APIPA Failure – v1.0.0
Loss of pfSense WebGUI access caused by APIPA addressing on the client system, resolved through static IP reconfiguration and connectivity validation.
REPORT – OpenVPN Remote Access VPN Deployment and Validation – v1.0.0
Deployment and validation of an OpenVPN remote access solution to provide secure encrypted tunneling for remote clients over untrusted networks.
REPORT – Access Control Bypass & Network Stability – v1.0.0
Resolution of a multi-layered connection failure involving Domain GPO restrictions and virtual network instability in a macOS-UTM environment.
REPORT – RDP Troubleshooting for AWS Users – v1.0.0
Resolution of Remote Desktop Protocol (RDP) access failures on an AWS-hosted Windows instance through group membership and policy validation.
REPORT – IP Subnetting Fundamentals – v1.0.0
Implementation of structured IP subnetting to enable network segmentation, reducing the attack surface and improving access control.
REPORT – SMB Protocol: Function and Security Risks – v1.1.0
Analysis of the Server Message Block (SMB) protocol, its vulnerabilities, and security improvements for modern networks.
GUIDE – Hands-On Network Fundamentals (OSI, TCP/IP, VPNs) – v1.0.0
Hands-on labs covering OSI, TCP/IP, and VPN setup to build real-world networking and cybersecurity skills.
REPORT – Enterprise IPsec VPN Diagnostics – v1.0.0
Setup and validation of a site-to-site IPsec VPN to secure data between enterprise networks.
REPORT – DNS Analysis with dig – v1.0.1
DNS analysis using the dig tool to check resolver behavior, record types, and basic DNS security.
REPORT – DNS Outage and Port 53 Failure Analysis – v1.0.1
Investigation of a DNS service outage, focusing on UDP port 53 issues and ICMP error responses.
Governance and Risk
SOP - Access Control Incident & NIST Alignment - v1.2.1
Analysis of a data exposure incident caused by weak access controls and lack of enforced security policies.
REPORT – BYOD in Organizations: Security, Challenges, and Strategies – v1.0.1
Analysis of BYOD risks and the use of security controls to protect corporate data on personal devices.
REPORT – Bank Risk Register Analysis – v1.0.2
Analysis of operational and technical risks for a coastal financial institution, prioritizing threats to customer data and business continuity.
REPORT– AC-6 Least Privilege (NIST SP 800-53) – v1.0.2
Implementation of least privilege controls to reduce risk and limit unauthorized access in enterprise systems.
REPORT – Risk Assessment Adapted from NIST SP 800-30 Rev. 1 – v1.0.2
Implementation of a structured risk assessment framework to identify, analyze, and prioritize organizational threats and vulnerabilities.
Operational Approach
REPORT – Prompt & Rubric Evaluation Exercises – v1.0.0
Analysis of prompts and rubrics to improve clarity, reduce ambiguity, and increase consistency in technical evaluations.
GUIDE – Cybersecurity Report Template Design – v1.0.0
Building a reusable cybersecurity report template was about clarity, consistency, and professional communication.
GUIDE – Hands-On Cybersecurity Progression (MICS to MSAF) – v1.0.0
MCSI labs provide scenario-based exercises that bridge IT fundamentals with advanced cybersecurity practices, building a portfolio of applied skills.
GUIDE – Entry-Level Cybersecurity Portfolio Development – v1.0.0
Hands-on experience is essential for cybersecurity newcomers. MCSI provides a structured, apprenticeship-style training to build applied skills and documentation expertise.
OSINT Investigation
REPORT – Geolocation and Image Verification Analysis – v1.0.0
Application of advanced reverse image search and visual analysis techniques to verify artifacts and geolocate global landmarks.
REPORT – OSINT Email Enumeration & Validation – v1.0.1
Execution of email reconnaissance and validation techniques to identify organizational naming conventions and verify active communication channels.
REPORT – Using Google Translate for OSINT – v1.1.0
Using translation tools to process and validate foreign-language data from multiple sources including articles, code, images, documents, and webpages.
Operational Resilience
GUIDE – Backup and Restore Using Duplicati CLI – v1.0.1
Execution and validation of command-line based backup and recovery workflows using Duplicati to ensure data recoverability and integrity.