Basic Host-Based Penetration Testing
Host-based penetration testing project focused on identifying, exploiting, and mitigating system-level security weaknesses in a controlled environment.
View projectCybersecurity • Network Engineering • Documentation
Cybersecurity & Network Engineering student focused on real-world infrastructure and
security.
I design, build, and document secure network infrastructures.
I build network and security lab environments, document implementations step-by-step, and validate results with repeatable checks. My portfolio is structured to showcase outcomes quickly while preserving the technical depth engineers expect.
Courses: show formal training and key outcomes.
Projects: highlight major builds end-to-end.
Documentation: contains step-by-step writeups (procedures, commands, verification, and troubleshooting).
Three representative projects — each includes architecture, implementation details, verification, and links to related documentation.
Host-based penetration testing project focused on identifying, exploiting, and mitigating system-level security weaknesses in a controlled environment.
View projectHands-on cybersecurity lab focused on system hardening, detection, and validating defensive controls through controlled testing.
View projectDesigned and validated multi-device network labs with dynamic routing, VLAN segmentation, and protocol analysis (IPs anonymized).
View projectRecent posts. Each post follows a procedure-first template with verification and troubleshooting.
An IPv6-based multi-area network implementing OSPF, EIGRP, route redistribution, and ACLs to validate secure end-to-end connectivity.
ReadAn IPv4-based enterprise network implementing EIGRP, HSRP, NAT, and redundancy mechanisms to validate resilient routing and end-to-end connectivity.
ReadA foundational routed network implementing RIP, VLAN segmentation, NAT, and device standardization to validate basic internetwork connectivity and traffic flow.
ReadProcedure-driven hardening notes with validation steps.
ReadDocumenting rules and proving behavior with targeted tests.
ReadOngoing notes on applying WebAssembly to security and cloud-native infrastructure.
ReadBest way to reach me is email. LinkedIn is also available.