Troubleshooting Internet Connectivity in Linux (A Step-By-Step DNS Fix)

In this project, I recorded a hands-on demonstration of how to diagnose and fix DNS and internet connectivity issues on a Linux workstation. The walkthrough covers checking network interfaces, testing connectivity, verifying system services, correcting Ne...
Read More

Initializing a New Hard Drive on Linux

A practical Linux project where I set up a brand-new hard drive from scratch identifying it, creating partitions, formatting it, mounting it, and giving a specific user access. This project demonstrates the fundamentals of Linux disk management and helps ...
Read More

Troubleshooting OneDrive Issues - Tier 1 Helpdesk Project

This project showcases a step-by-step approach to diagnosing and resolving common OneDrive issues encountered in a Tier 1 helpdesk environment. From identifying sync errors and verifying sign-in credentials to checking storage limits and restarting the cl...
Read More

Clearing Stuck Print Jobs in the Queue

In my AD lab environment, I built a mini-project around one of the most common helpdesk issues: printers refusing to print because of a stuck job. I simulated this by creating a jammed queue and then cleared it by stopping the print spooler service, delet...
Read More

Remapping a Network Drive After a Password Change

In my AD lab, I built another mini-project that focused on troubleshooting mapped drives after a user changes their password. It’s a small but common issue: drives show disconnected (red X) until remapped with the updated credentials. I practiced remappin...
Read More

Resetting a Forgotten User Password in Active Directory

As part of my Active Directory environment from a previous project, I created a mini-project to simulate a very real Tier 1 task: handling a forgotten password. I practiced verifying the user, resetting the password in ADUC, and enforcing security require...
Read More

Windows Server Domain Setup with PowerShell & GPOs

In this project, I built a full Active Directory environment from scratch. I configured OUs and security groups with PowerShell, automated user creation from CSV files, and set up file shares on a dedicated disk with mapped drives for each department.Grou...
Read More

Wi-Fi Troubleshooting Basics: A Step-by-Step Guide for Tier 1 Helpdesk

Wi-Fi issues are one of the most common problems faced at the helpdesk. This guide walks through the essential steps every Tier 1 support technician should follow when troubleshooting Wi-Fi problems from asking the right questions, checking router status,...
Read More

Printer Troubleshooting Guide for Helpdesk Technicians (Tier 1 Support)

This step-by-step guide covers the essential troubleshooting process for printers, designed for Tier 1 helpdesk and desktop support technicians. From checking cables and power to clearing print queues, verifying drivers, and escalating hardware issues, it...
Read More

Securing a Linux VM with Automated Azurite Blob Storage Backups

In this project, I walk through building a secure Linux virtual machine on VirtualBox, hardening it with a firewall and Fail2Ban, and setting up safe SSH access. I then automate backups to Azurite (an Azure Storage emulator) using scripts, AzCopy, and cro...
Read More

Standard Operating Procedure (SOP) – Vulnerability Assessment

Keeping systems secure in today’s digital world requires a structured approach to identifying and mitigating vulnerabilities. The following SOP provides a step-by-step process for conducting vulnerability assessments across applications, servers, networks...
Read More

Penetration Testing Lab with Kali Linux & Metasploitable 2

Set up a test environment with Kali Linux as the attacker machine and Metasploitable 2 as the target, exploring reconnaissance and exploitation techniques.Penetration Testing Lab with Kali Linux & Metasploitable 2
Read More

Vulnerability Assessment for Eduvos Web Application

Conducted a step-by-step vulnerability assessment, using scanning tools, manual testing, and risk prioritization to identify and address security risks.
Read More

Beginner’s Guide to Creating an EC2 Instance and Connecting via SSH

This project guides you through creating a custom VPC, launching an EC2 instance inside it, and connecting via SSH. Steps include naming the VPC, assigning a CIDR block, creating a subnet, launching the EC2 instance, assigning a public IP, configuring sec...
Read More

Static Portfolio Website with SSL Certificates

In this project, we walked through building a static portfolio website using AWS S3, Route 53, ACM, and CloudFront. The guide covers creating an S3 bucket, uploading website files, enabling static web hosting, connecting a custom domain, and securing the ...
Read More

Network+ Practice Scenarios

Completed and documented multiple hands-on networking exercises as part of the Network+ module requirements.Network+ Practice Scenarios
Read More

Network Troubleshooting – Domain Access Issue

Investigated and resolved a case where a user could connect via IP address but not by domain name.Network Troubleshooting – Domain Access Issue
Read More

Private VM Network Configuration in Hyper-V

Configured two VMs to communicate over an isolated private network, blocking connectivity to the physical host.Private VM Network Configuration in Hyper-V
Read More

Windows Server 2016 & Windows 10 Virtual Machine Installation (Hyper-V)

Created and installed two virtual machines in Hyper-V  one running Windows Server 2016 and the other running Windows 10.Windows Server 2016 & Windows 10 Virtual Machine Installation (Hyper-V)
Read More

Server Virtualization Implementation & Cost-Benefit Analysis

Designed and implemented a server virtualization plan, performed risk assessments, and analyzed financial implications for adoption.Server Virtualization Implementation & Cost-Benefit Analysis
Read More

Virtual Office Infrastructure with Remote Server & Printer Management

Simulated a real-world office IT environment, implementing remote server access, printer sharing, and centralized resource management.Virtual Office Infrastructure with Remote Server & Printer Management
Read More

Hardened MySQL Deployment

Configured and secured a MySQL database server with measures such as SSL encryption, firewall rules, Fail2Ban, and audit logging for a production-like environment.Hardened MySQL Deployment
Read More

Secure Headless Database Infrastructure Using VirtualBox

Built a secure, headless MySQL server infrastructure in VirtualBox, with hardened OS, remote management via SSH, and security monitoring tools.Secure Headless Database Infrastructure Using VirtualBox
Read More

Automated Active Directory User Creation with PowerShell & CSV

Developed a PowerShell automation script to streamline the creation of multiple Active Directory users from a CSV file. Includes data validation, OU assignment, and secure password generation to improve onboarding efficiency.1.Automated Active Directory U...
Read More

Virtualisation Challenges in the IT World

A research and analysis paper discussing the technical, security, and operational challenges faced in virtualised IT environments. Covers scalability issues, resource contention, security risks, and emerging trends.Virtualisation Challenges in the IT Worl...
Read More