Cybersecurity • Network Engineering • Documentation

Hyuntae Yoo (Hunter)

Cybersecurity & Network Engineering student focused on real-world infrastructure and security.
I design, build, and document secure network infrastructures.


About

What I do

I build network and security lab environments, document implementations step-by-step, and validate results with repeatable checks. My portfolio is structured to showcase outcomes quickly while preserving the technical depth engineers expect.

Purdue University Cybersecurity & Network Engineering Technology

How this site is organized

Courses: show formal training and key outcomes.

Projects: highlight major builds end-to-end.

Documentation: contains step-by-step writeups (procedures, commands, verification, and troubleshooting).

Minimal UI Big typography Scroll-first layout

Featured Projects

Three representative projects — each includes architecture, implementation details, verification, and links to related documentation.

Basic Host-Based Penetration Testing

Host-based penetration testing project focused on identifying, exploiting, and mitigating system-level security weaknesses in a controlled environment.

Enumeration Exploitation Privilege Escalation Mitigation Documentation
View project

Cybersecurity Home Lab

Hands-on cybersecurity lab focused on system hardening, detection, and validating defensive controls through controlled testing.

Hardening Detection Segmentation Penetration Testing Infrastructure Firewall IDS/IPS
View project

Network Engineering Lab

Designed and validated multi-device network labs with dynamic routing, VLAN segmentation, and protocol analysis (IPs anonymized).

OSPFEIGRPIPv4IPv6VLANsSNMPFiberWiresharkCiscoHP/ArubaJuniper
View project

Latest Documentation

Recent posts. Each post follows a procedure-first template with verification and troubleshooting.

Link State Routing, Layer 3 Redundancy, ACLs, and Redistribution

An IPv6-based multi-area network implementing OSPF, EIGRP, route redistribution, and ACLs to validate secure end-to-end connectivity.

ConceptsVerification
Read

Distance Vector Routing and Layer 3 Redundancy

An IPv4-based enterprise network implementing EIGRP, HSRP, NAT, and redundancy mechanisms to validate resilient routing and end-to-end connectivity.

ConceptsConfig Guides
Read

RIP, Spanning Tree, Link Aggregation, and L3 Redundancy

A foundational routed network implementing RIP, VLAN segmentation, NAT, and device standardization to validate basic internetwork connectivity and traffic flow.

Lab NotesDiagrams
Read

Linux hardening baseline

Procedure-driven hardening notes with validation steps.

Lab NotesTroubleshooting
Read

Firewall rule testing method

Documenting rules and proving behavior with targeted tests.

Config GuidesVerification
Read

Research notes: WASM in security

Ongoing notes on applying WebAssembly to security and cloud-native infrastructure.

Research NotesWASM
Read
Browse all documentation

Contact

Best way to reach me is email. LinkedIn is also available.

Email

htyoo@purdue.edu

Response-friendlyInternship / Full time

LinkedIn

https://www.linkedin.com/in/hyuntaeyoo

Professional timelineProject highlights