Set up a test environment with Kali Linux as the attacker machine and Metasploitable 2 as the target, exploring reconnaissance and exploitation techniques.Penetration Testing Lab with Kali Linux & Metasploitable 2
Read More
Conducted a step-by-step vulnerability assessment, using scanning tools, manual testing, and risk prioritization to identify and address security risks.
Read More
This project guides you through creating a custom VPC, launching an EC2 instance inside it, and connecting via SSH. Steps include naming the VPC, assigning a CIDR block, creating a subnet, launching the EC2 instance, assigning a public IP, configuring sec...
Read More
Completed and documented multiple hands-on networking exercises as part of the Network+ module requirements.Network+ Practice Scenarios
Read More
Investigated and resolved a case where a user could connect via IP address but not by domain name.Network Troubleshooting – Domain Access Issue
Read More
Configured two VMs to communicate over an isolated private network, blocking connectivity to the physical host.Private VM Network Configuration in Hyper-V
Read More