Security Operations

Security Operations, Hardening, and Monitoring Labs

Security Operations Laboratory Overview

This section documents hands-on security operations labs focused on endpoint hardening, network security, system monitoring, and incident response activities.

Each lab applies structured analysis to identify abnormal behavior, enforce security controls, and validate system integrity after remediation.

Lab Distribution Summary

Category Labs
Perimeter Defense & Secure Connectivity 4
Endpoint Hardening & Access Control 9
Infrastructure Protection & Recovery 1
Threat Hunting & Malware Analysis 1
Incident Response & Monitoring 1
Lab Demonstrations 8
Total Security Operations Labs Documented 24

🛡️ Perimeter Defense & Secure Connectivity

These reports establish the foundational knowledge required to design and implement perimeter defenses and secure network connectivity. The focus is on protecting systems and data from external threats through firewalls, VPNs, and secure communication protocols.

The goal is to ensure that systems are well-protected at the network boundary, with clear strategies to identify, prevent, and mitigate attacks while ensuring secure communication across enterprise environments.

REPORT – Enterprise IPsec VPN Diagnostics – v1.0.0

Demonstrates building and validating a site-to-site IPsec VPN between enterprise locations to secure data in transit over untrusted networks.

Skills: IPsec VPN · IKE · ACLs

View Report

REPORT – pfSense IDS Traffic Monitoring and EternalBlue Detection – v1.0.0

Overview of firewall technologies and their role in enforcing network perimeter security.

Skills: Network Security · Perimeter Defense · Firewall Policy

View Report

REPORT – OpenVPN Remote Access Deployment and Validation – v1.0.0

Deployment and validation of an OpenVPN remote access solution to provide secure connectivity for remote systems.

Skills: VPN Deployment · Encryption · Secure Remote Access

View Report

REPORT – Troubleshooting pfSense DNS Resolution – v1.0.0

Demonstrates diagnosing and resolving DNS failures in a hardened pfSense environment by enforcing controlled access under a default-deny firewall policy.

Skills: DNS Troubleshooting · pfSense · Network Diagnostics

View Report

🔐 Endpoint Hardening & Access Control

REPORT – Deploy Controlled Folder Access via Local GPO – v1.0.0

Implemented Controlled Folder Access (CFA) using Local Group Policy to restrict unauthorized applications from modifying protected directories and mitigate ransomware-based file encryption risks.

Skills: CFA · Endpoint Hardening · GPO Security · Ransomware Defense

View Report

REPORT – Hardening UAC via Local Group Policy – v1.0.0

Implemented hardened User Account Control (UAC) settings using Local Group Policy to enforce credential-based elevation and secure desktop protections against privilege escalation.

Skills: UAC Hardening · Privilege Management · GPO Security · Secure Desktop

View Report

REPORT – OS Patching Enforcement via Local GPO – v1.0.0

Implemented automated OS patching using Local Group Policy to reduce vulnerability exposure while maintaining system availability.

Skills: Patch Management · GPO Configuration · Endpoint Hardening · Update Policy Enforcement

View Report

REPORT – Hardening Microsoft Edge via Local GPO – v1.0.0

Hardened Microsoft Edge using Local Group Policy to reduce attack surface and enforce secure browser configurations.

Skills: Browser Hardening · GPO Configuration · Endpoint Security

View Report

REPORT – Applying a Local GPO for Session Lock Enforcement – v1.0.0

Configured session lock policies using Local Group Policy to automatically secure idle systems and reduce unauthorized access risk.

Skills: GPO Configuration · Endpoint Hardening · Access Control Enforcement

View Report

REPORT – SMB Hardening for Credential Theft Protection – v1.0.0

Applied SMB security policies to reduce exposure to credential harvesting and lateral movement.

Skills: SMB Hardening · Credential Protection · Lateral Movement Mitigation

View Report

REPORT – Endpoint Security with Windows Registry – v1.0.0

Demonstrates using Windows Registry configuration to restrict system utilities and strengthen endpoint security controls.

Skills: Registry Hardening · Threat Surface Reduction · OS Security

View Report

REPORT – Enterprise Security Software Types – v1.0.1

Comprehensive research into enterprise defensive technologies including EDR, IAM, IDS/IPS, and secure operating environments.

Skills: EDR · IAM · Endpoint Protection · Defense-in-Depth

Request Access

REPORT – Research on the Top Penetration Testing Tools – v1.0.0

Technical evaluation of industry-standard penetration testing tools used for vulnerability discovery and exploitation testing.

Skills: Vulnerability Assessment · Penetration Testing Tools · Security Auditing

Request Access

🧱 Infrastructure Protection & Recovery

REPORT – AD Disaster Recovery & Identity Restoration – v1.0.2

Simulates a full Domain Controller failure and demonstrates how to restore an Active Directory environment using Bare Metal Recovery (BMR) on Windows Server 2016.

Skills: Active Directory Recovery · BMR · DSRM · System State Restore · Disaster Recovery Validation

View Report

🚨 Incident Response & Monitoring

REPORT – Forced Browsing Data Breach – v1.1.0

Post-incident investigation of a web application data breach caused by broken access control, including log analysis, root cause identification, and remediation of unauthorized data access.

Skills: Incident Response · Log Analysis · Web Security · Access Control · Root Cause Analysis

View Report

🔍 Threat Hunting & Malware Analysis

REPORT – Portable Executable (PE) File Analysis Using PEStudio – v1.0.0

Technical analysis of Windows Portable Executable (PE) files to identify structural anomalies, extract compilation metadata, and analyze internal strings to support static malware detection and threat hunting workflows.

Skills: Static Analysis · PE File Structure · Malware Detection · Threat Hunting · PEStudio

Request Access


Lab Demonstrations

🛡️ Detection & Monitoring Labs

LAB – Network Traffic Monitoring with pfSense and Snort – v1.0.0

Monitoring and analyzing network traffic using IDS/IPS tools to detect suspicious activity and potential intrusions.

Request Access

🔍 Vulnerability Assessment Labs

LAB – Vulnerability Scanning Using OpenVAS – v1.0.0

Performing vulnerability assessments to identify and prioritize security weaknesses across networked systems.

Request Access

LAB – Deploying OpenVAS with Docker – v1.0.0

Containerized deployment of OpenVAS for scalable and repeatable vulnerability scanning environments.

Request Access

LAB – SSL/TLS Configuration Assessment with sslscan – v1.0.0

Evaluating cryptographic configurations and identifying weak protocols and cipher suites in secure communications.

Request Access

🧬 Threat Detection Engineering (YARA) Labs

LAB – YARA Environment Setup – v1.0.0

Setting up a malware detection environment using YARA for rule-based file analysis.

Request Access

LAB – Creating YARA Rules – v1.0.0

Developing rule-based signatures to identify malware patterns and suspicious file characteristics.

Request Access

LAB – Detecting Small PE Files Using YARA – v1.0.0

Identifying suspicious executables through size-based and structural pattern matching.

Request Access

LAB – Self-Matching YARA Rule – v1.0.0

Validating YARA rule behavior by testing detection logic against controlled datasets.

Request Access


Portfolio Documentation

This section reflects hands-on security operations work across system hardening, monitoring, secure connectivity, and recovery. Each project focuses on enforcing controls, validating security configurations, and identifying risks within operational environments.

While selected labs are displayed here, they are supported by a larger archive of technical reports, configuration documentation, and investigative notes maintained within a private research repository.

Complete documentation and supporting materials are available upon request for professional or technical review.