PERSONAL Projects, CTFS, Certifications
iCyberDefend Detection and Attack Lab PT 1
This first article of a 3-part series of articles describes a custom-built cloud environment consisting of a secure network configured pfSense firewall, multiple subnets, an active directory with a domain controller, a detection SIEM called Graylog, and an attack host.
Microsoft azure HArdening Walkthrough
In this walkthrough, I perform network configuration changes and secure cloud best practices for an Azure sandbox that already enables open access to it. Before production deployment, I cover key points on how to securely configure blob storage, user account, a container, as well as allow/denial of NSG ports.
CERTIFICATIONS




