In this project, I recorded a hands-on demonstration of how to diagnose and fix DNS and internet connectivity issues on a Linux workstation. The walkthrough covers checking network interfaces, testing connectivity, verifying system services, correcting Ne...
Read More
A practical Linux project where I set up a brand-new hard drive from scratch identifying it, creating partitions, formatting it, mounting it, and giving a specific user access. This project demonstrates the fundamentals of Linux disk management and helps ...
Read More
This project showcases a step-by-step approach to diagnosing and resolving common OneDrive issues encountered in a Tier 1 helpdesk environment. From identifying sync errors and verifying sign-in credentials to checking storage limits and restarting the cl...
Read More
In my AD lab environment, I built a mini-project around one of the most common helpdesk issues: printers refusing to print because of a stuck job. I simulated this by creating a jammed queue and then cleared it by stopping the print spooler service, delet...
Read More
In my AD lab, I built another mini-project that focused on troubleshooting mapped drives after a user changes their password. It’s a small but common issue: drives show disconnected (red X) until remapped with the updated credentials. I practiced remappin...
Read More
As part of my Active Directory environment from a previous project, I created a mini-project to simulate a very real Tier 1 task: handling a forgotten password. I practiced verifying the user, resetting the password in ADUC, and enforcing security require...
Read More
In this project, I built a full Active Directory environment from scratch. I configured OUs and security groups with PowerShell, automated user creation from CSV files, and set up file shares on a dedicated disk with mapped drives for each department.Grou...
Read More
Wi-Fi issues are one of the most common problems faced at the helpdesk. This guide walks through the essential steps every Tier 1 support technician should follow when troubleshooting Wi-Fi problems from asking the right questions, checking router status,...
Read More
This step-by-step guide covers the essential troubleshooting process for printers, designed for Tier 1 helpdesk and desktop support technicians. From checking cables and power to clearing print queues, verifying drivers, and escalating hardware issues, it...
Read More
In this project, I walk through building a secure Linux virtual machine on VirtualBox, hardening it with a firewall and Fail2Ban, and setting up safe SSH access. I then automate backups to Azurite (an Azure Storage emulator) using scripts, AzCopy, and cro...
Read More
Keeping systems secure in today’s digital world requires a structured approach to identifying and mitigating vulnerabilities. The following SOP provides a step-by-step process for conducting vulnerability assessments across applications, servers, networks...
Read More
Set up a test environment with Kali Linux as the attacker machine and Metasploitable 2 as the target, exploring reconnaissance and exploitation techniques.Penetration Testing Lab with Kali Linux & Metasploitable 2
Read More
Conducted a step-by-step vulnerability assessment, using scanning tools, manual testing, and risk prioritization to identify and address security risks.
Read More
This project guides you through creating a custom VPC, launching an EC2 instance inside it, and connecting via SSH. Steps include naming the VPC, assigning a CIDR block, creating a subnet, launching the EC2 instance, assigning a public IP, configuring sec...
Read More
In this project, we walked through building a static portfolio website using AWS S3, Route 53, ACM, and CloudFront. The guide covers creating an S3 bucket, uploading website files, enabling static web hosting, connecting a custom domain, and securing the ...
Read More
Completed and documented multiple hands-on networking exercises as part of the Network+ module requirements.Network+ Practice Scenarios
Read More
Investigated and resolved a case where a user could connect via IP address but not by domain name.Network Troubleshooting – Domain Access Issue
Read More
Configured two VMs to communicate over an isolated private network, blocking connectivity to the physical host.Private VM Network Configuration in Hyper-V
Read More
Created and installed two virtual machines in Hyper-V one running Windows Server 2016 and the other running Windows 10.Windows Server 2016 & Windows 10 Virtual Machine Installation (Hyper-V)
Read More
Designed and implemented a server virtualization plan, performed risk assessments, and analyzed financial implications for adoption.Server Virtualization Implementation & Cost-Benefit Analysis
Read More
Simulated a real-world office IT environment, implementing remote server access, printer sharing, and centralized resource management.Virtual Office Infrastructure with Remote Server & Printer Management
Read More
Configured and secured a MySQL database server with measures such as SSL encryption, firewall rules, Fail2Ban, and audit logging for a production-like environment.Hardened MySQL Deployment
Read More
Built a secure, headless MySQL server infrastructure in VirtualBox, with hardened OS, remote management via SSH, and security monitoring tools.Secure Headless Database Infrastructure Using VirtualBox
Read More
Developed a PowerShell automation script to streamline the creation of multiple Active Directory users from a CSV file. Includes data validation, OU assignment, and secure password generation to improve onboarding efficiency.1.Automated Active Directory U...
Read More
A research and analysis paper discussing the technical, security, and operational challenges faced in virtualised IT environments. Covers scalability issues, resource contention, security risks, and emerging trends.Virtualisation Challenges in the IT Worl...
Read More