Skip to content

TrexterX17/Labs-For-System-Security

Folders and files

NameName
Last commit message
Last commit date

Latest commit

Β 

History

29 Commits
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 
Β 

Repository files navigation

πŸ” System Security Labs Portfolio

By Faraz Ahmed
Hands-On Security Engineering & System Administration


πŸ‘‹ About This Repository

This repository showcases my practical, hands-on experience in system security, network administration, and cybersecurity operations. Each lab demonstrates real-world skills in configuring, securing, and analyzing computer systems and networks.


🎯 Core Competencies Demonstrated

Through these labs, I have developed and demonstrated proficiency in:

πŸ–₯️ System Administration

  • Cross-platform OS deployment (Windows & Linux)
  • Virtualization management (VMware vSphere)
  • System hardening and security configuration
  • User and permission management

🌐 Network Security

  • Network configuration and troubleshooting
  • TCP/IP protocol analysis
  • Routing and switching concepts
  • DNS and connectivity diagnostics

πŸ›‘οΈ Security Operations

  • Security baseline implementation
  • Vulnerability assessment
  • Incident response procedures
  • Security monitoring and logging

πŸ”§ Technical Tools

  • Command-line proficiency (PowerShell, Bash)
  • Network diagnostic utilities
  • Virtualization platforms
  • Security assessment tools

πŸ“š Lab Directory

Lab # Title Key Skills Difficulty
[01] OS Installation & Network Connectivity Virtualization, Network Diagnostics, Cross-Platform Admin ⭐ Beginner
[02] pfSense Router & Network Segmentation Firewall Configuration, IDS Deployment, Network Architecture ⭐⭐ Intermediate
[03] Firewall Rules & Access Control Protocol-Specific Rules, Least Privilege, Security Testing ⭐⭐⭐ Intermediate/Advanced
[04] Active Directory & Group Policy AD DS, User Management, GPO, IIS, PowerShell Logging ⭐⭐⭐⭐ Advanced
[05] Linux Server Hardening & Automation LAMP Stack, Security Hardening, Bash Scripting, Cron Jobs ⭐⭐⭐⭐ Advanced
[06] Windows Threat Hunting & Incident Response Malware Analysis, IFEO Forensics, Event Log Analysis, IR Documentation ⭐⭐⭐⭐⭐ Expert
[07] Service Deployment, MediaWiki & Fail2Ban MariaDB Admin, MediaWiki, iptables, Fail2Ban, Multi-Tier Architecture ⭐⭐⭐⭐⭐ Expert
[08] Network Architecture & Security Proposals Network Documentation, Honeypots, IDPS, Business Case Writing, ROI Analysis ⭐⭐⭐⭐⭐ Expert
[09] Containerization & SIEM (Graylog) Docker, Docker Compose, Graylog, rsyslog, Alert Engineering, SOC Dashboards ⭐⭐⭐⭐⭐ Expert
[10] Risk Analysis & Management PII/SPII Assessment, SIEM Evaluation, Cost-Benefit Analysis, Executive Memos ⭐⭐⭐⭐⭐ Expert
[11] Penetration Testing & Ethical Hacking Nmap, SQL Injection, Reverse Shells, Privilege Escalation, Pentest Reporting ⭐⭐⭐⭐⭐ Expert

Note: This repository is actively being updated as I complete additional labs. Check back for new content!


πŸ”¬ Lab 01: Operating System Installation & Network Connectivity

Status: βœ… Complete | View Full Documentation β†’

Quick Overview

Deployed Windows 10 Enterprise and Ubuntu Linux in a virtualized environment, configured network settings, and validated connectivity using platform-specific CLI tools.

Key Achievements

  • βœ… Successfully installed two enterprise operating systems
  • βœ… Configured virtual networking infrastructure
  • βœ… Performed cross-platform network diagnostics
  • βœ… Created network topology documentation

Technologies Used

VMware vSphere Windows 10 Enterprise Ubuntu Linux PowerShell Bash TCP/IP DNS

β†’ Read Full Lab Documentation


πŸ›‘οΈ Lab 02: pfSense Router Configuration & Network Segmentation

Status: βœ… Complete | View Full Documentation β†’

Quick Overview

Deployed pfSense firewall/router to create segmented enterprise network architecture with AdminNet and ServerNet zones. Configured static routing between segments and implemented Suricata IDS for network monitoring.

Key Achievements

  • βœ… Installed and configured pfSense CE 2.7.2 router
  • βœ… Created multi-segment network architecture (AdminNet, ServerNet)
  • βœ… Configured advanced Windows PowerShell and Linux netplan networking
  • βœ… Deployed Suricata IDS on external interface
  • βœ… Validated inter-VLAN routing and internet connectivity
  • βœ… Implemented security best practices (network segmentation, monitoring)

Technologies Used

pfSense Suricata IDS Network Segmentation PowerShell netplan Inter-VLAN Routing IDS/IPS Enterprise Networking

β†’ Read Full Lab Documentation


πŸ”₯ Lab 03: Firewall Configuration & Access Control

Status: βœ… Complete | View Full Documentation β†’

Quick Overview

Implemented granular firewall rules on pfSense to control inbound and outbound traffic, restricted administrative access to a single designated workstation, and systematically validated rule effectiveness through comprehensive testing.

Key Achievements

  • βœ… Created protocol-specific inbound rules (WinRM, RDP, SSH)
  • βœ… Configured outbound rules for business functions (FTP, HTTP/HTTPS, DNS, Windows Update)
  • βœ… Implemented least-privilege administrative access (only one device manages firewall)
  • βœ… Disabled overly-permissive anti-lockout rule
  • βœ… Conducted 17 validation tests with 100% success rate
  • βœ… Authored professional security policy memo for executive approval
  • βœ… Demonstrated defense-in-depth and zero-trust principles

Technologies Used

pfSense Firewall Rules WinRM RDP SSH Access Control Lists Protocol Filtering Security Testing Policy Documentation Least Privilege

β†’ Read Full Lab Documentation


🏒 Lab 04: Active Directory & Group Policy Management

Status: βœ… Complete | View Full Documentation β†’

Quick Overview

Deployed enterprise Active Directory infrastructure with domain services, created centralized user and group management, implemented Group Policy Objects for configuration control, installed IIS web server, and established PowerShell logging for security monitoring.

Key Achievements

  • βœ… Deployed Active Directory domain (team32.local) with domain controller
  • βœ… Joined Win10Client and IISServer to domain for centralized management
  • βœ… Created users with role-based permissions (Kevin - Domain Admin, Dave CEO - Standard User)
  • βœ… Implemented security groups (UBFaculty, Workstations) for access control
  • βœ… Deployed IIS web server on IISServer with remote management
  • βœ… Created Desktop Background GPO with network share distribution
  • βœ… Implemented PowerShell Transcription GPO for security auditing
  • βœ… Designed Organizational Unit structure for granular policy application
  • βœ… Authored executive memo proposing password policy enhancements
  • βœ… Demonstrated Single Sign-On (SSO) and centralized authentication

Technologies Used

Active Directory Group Policy Objects (GPO) IIS Web Server PowerShell Logging Domain Services RBAC Server Manager Organizational Units Network Shares Security Auditing

β†’ Read Full Lab Documentation


🐧 Lab 05: Linux Server Hardening & Automation

Status: βœ… Complete | View Full Documentation β†’

Quick Overview

Deployed enterprise Linux infrastructure with Ubuntu web server (Apache2 + PHP) and Rocky Linux database server (MariaDB), implemented comprehensive security hardening including password policies and file permissions, created user/group management with RBAC, and automated log backup with bash scripting and cron scheduling.

Key Achievements

  • βœ… Deployed LAMP stack (Linux, Apache, MySQL/MariaDB, PHP) across two servers
  • βœ… Configured cross-distribution Linux (Ubuntu + Rocky Linux)
  • βœ… Implemented 6 security hardening controls (CIS Benchmark alignment)
  • βœ… Enforced password complexity (10 chars, 2 digits, 1 uppercase)
  • βœ… Created 5 users and 3 security groups with role-based access
  • βœ… Configured sudo privileges with visudo for BlackTeam group
  • βœ… Applied file permission restrictions (chmod 700, 750)
  • βœ… Enabled automatic security updates (unattended-upgrades)
  • βœ… Wrote bash script for automated log backup with tar compression
  • βœ… Scheduled daily cron job (4:05 AM) for log management
  • βœ… Added 7 pfSense firewall rules for server access control

Technologies Used

Ubuntu Server Rocky Linux Apache2 PHP MariaDB Bash Scripting Cron PAM sudo/visudo libpam-pwquality SELinux unattended-upgrades systemd tar Log Management

β†’ Read Full Lab Documentation


πŸ” Lab 06: Windows Threat Hunting & Incident Response

Status: βœ… Complete | View Full Documentation β†’

Quick Overview

Conducted real-world incident response investigation by analyzing a security breach involving brute force authentication, identified and removed IFEO (Image File Execution Options) registry hijacking malware, eliminated unauthorized user account and persistence mechanisms, and documented findings in a professional incident report with executive summary and security recommendations.

Key Achievements

  • βœ… Investigated active security incident using Windows Event Viewer
  • βœ… Identified attack timeline through Event ID analysis (4624, 4625, 4720, 4732)
  • βœ… Discovered IFEO registry hijacking (Task Manager β†’ Notepad redirect)
  • βœ… Analyzed brute force authentication attack vector and successful breach
  • βœ… Removed unauthorized backdoor account ("notbad") created via PowerShell
  • βœ… Eradicated malware persistence mechanisms (registry keys, files, processes)
  • βœ… Performed system integrity verification with System File Checker (sfc /scannow)
  • βœ… Documented complete incident report with IoCs and remediation steps
  • βœ… Provided executive summary with business impact assessment
  • βœ… Created security recommendations (MFA, password policy, EDR, SIEM)
  • βœ… Performed Linux network forensics with socket statistics (ss -tlp)

Technologies Used

Windows Event Viewer Registry Editor (regedit) IFEO Analysis PowerShell Forensics System File Checker Task Manager Malware Analysis Incident Response Event Log Analysis IoC Identification Network Forensics (ss) Threat Hunting

β†’ Read Full Lab Documentation


πŸš€ Lab 07: Service Deployment, MediaWiki & Fail2Ban

Status: βœ… Complete | View Full Documentation β†’

Quick Overview

Deployed a full multi-tier web application by configuring MariaDB with a dedicated database and least-privilege user on RockyDBServer, installed and integrated MediaWiki on UbuntuWebServer, implemented host-based iptables firewall rules with default-deny policy, validated access control across all network segments with systematic testing, and hardened SSH with Fail2Ban following a real brute force attack detection.

Key Achievements

  • βœ… Created dedicated MariaDB database (wiki_webdb) and non-root user with granular privileges
  • βœ… Deployed MediaWiki end-to-end: installation wizard, database integration, admin configuration
  • βœ… Connected web application to remote database across network segments (port 3306)
  • βœ… Implemented 7 iptables rules on UbuntuWebServer with default-deny policy
  • βœ… Layered host-based firewall (iptables) on top of network firewall (pfSense) β€” defense-in-depth
  • βœ… Ran 7 systematic access validation tests (4 allowed paths, 3 denied paths confirmed)
  • βœ… Deployed Fail2Ban in response to real SSH brute force attack (detected Oct 15, 2024)
  • βœ… Configured Fail2Ban: 5-attempt threshold, 1-hour ban, SSH jail monitoring
  • βœ… Authored executive security remediation memo to CEO with business impact analysis

Technologies Used

MariaDB MediaWiki iptables Fail2Ban Apache2/PHP curl SSH Multi-Tier Architecture Default-Deny Policy Least Privilege Defense-in-Depth

β†’ Read Full Lab Documentation


πŸ“Š Lab 08: Network Architecture & Security Proposals

Status: βœ… Complete | View Full Documentation β†’

Quick Overview

Created comprehensive network documentation including detailed hardware/software inventory across multiple network segments (AdminNet, ServerNet, OfficeNet, WebNet, GuestNet), designed enterprise multi-tier network topology with proper IP addressing and subnet architecture, and developed two executive-level security proposals with complete cost-benefit analysis for implementing honeypots/honeynets ($20K) and IDPS systems ($30K) including ROI justification and real-world incident case studies.

Key Achievements

  • βœ… Documented complete network inventory: 9 devices with MAC, IP, gateway, DNS, OS, services
  • βœ… Created network topology with 5 segments and proper CIDR notation
  • βœ… Designed multi-tier architecture: OfficeNet (10.2.0.0/28), WebNet (10.3.0.0/28), GuestNet (10.4.0.0/28)
  • βœ… Authored Proposal 1: Honeypots & Honeynets implementation ($20K investment)
  • βœ… Authored Proposal 2: IDPS deployment ($30K investment)
  • βœ… Researched industry data: 40% intrusion reduction, 60-70% faster breach detection
  • βœ… Cited real-world incidents: Target breach (2013), Equifax breach (2017)
  • βœ… Developed ROI analysis: $50K investment vs $4.45M breach cost prevention
  • βœ… Created 3-year TCO analysis with maintenance costs
  • βœ… Professional executive memo to CEO with business impact justification

Technologies Used

Network Documentation IPAM Honeypots Honeynets IDS/IPS IDPS Deception Technology Threat Intelligence Network Topology Design Business Case Development ROI Analysis Cost-Benefit Analysis

β†’ Read Full Lab Documentation


🎯 Lab 09: Containerization & SIEM (Graylog) [CAPSTONE LAB]

Status: βœ… Complete | View Full Documentation β†’

Quick Overview

Deployed enterprise SIEM infrastructure using Docker containerization with Graylog stack (Graylog + MongoDB + Elasticsearch), configured centralized log aggregation via rsyslog from Linux servers and pfSense network devices, engineered 4 custom security alerts for critical events (failed SSH, failed logins, firewall changes, privilege escalation), and built real-time SOC operational dashboard with automated monitoring capabilities.

Key Achievements

  • βœ… Deployed multi-container Graylog SIEM using Docker Compose (Infrastructure as Code)
  • βœ… Configured Graylog stack: Graylog + MongoDB (metadata) + Elasticsearch (log storage)
  • βœ… Implemented rsyslog forwarders on Linux (UbuntuWebServer) sending to UDP port 5140
  • βœ… Configured pfSense remote logging to centralized SIEM
  • βœ… Created 4 custom security alerts with search queries and thresholds
  • βœ… Alert 1: Failed SSH for non-existent user (brute force detection)
  • βœ… Alert 2: Failed login to pfSense WebConfigurator (admin compromise attempt)
  • βœ… Alert 3: Firewall rules changed (unauthorized configuration)
  • βœ… Alert 4: User added to sudo group (privilege escalation)
  • βœ… Built SOC dashboard with Events Overview, charts, and real-time widgets
  • βœ… Implemented firewall rules: HTTP access + syslog forwarding + default deny
  • βœ… Demonstrated log search, filtering, and forensic analysis capabilities

Technologies Used

Docker Docker Compose Graylog SIEM MongoDB Elasticsearch rsyslog Syslog Protocol YAML Alert Engineering SOC Operations Log Aggregation Security Event Detection Dashboard Development Containerization

β†’ Read Full Lab Documentation


πŸ“Š Lab 10: Risk Analysis & Management [FINAL LAB - LEADERSHIP CAPSTONE]

Status: βœ… Complete | View Full Documentation β†’

Quick Overview

Conducted comprehensive risk assessment of MediaWiki PII/SPII vulnerabilities by analyzing frontend user registration and backend database storage, identified critical security risks (password hashes, plaintext emails), evaluated SIEM solutions (SolarWinds vs. Wazuh) with complete 5-year TCO analysis ($513K vs. $10.5K), performed cost-benefit evaluation demonstrating $502K savings (98% reduction), and authored professional risk assessment memo to CEO with strategic technology recommendation.

Key Achievements

  • βœ… Identified PII vs. SPII in MediaWiki (usernames, emails, password hashes, real names)
  • βœ… Analyzed frontend security (admin panel with limited PII exposure - LOW RISK)
  • βœ… Analyzed backend security (MariaDB user table with SPII - HIGH RISK)
  • βœ… Quantified risk using likelihood Γ— impact methodology (Risk Score: 15/25 - HIGH)
  • βœ… Documented attack scenarios: SQL injection, insider threat, backup theft
  • βœ… Evaluated SolarWinds SIEM: $513K TCO, enterprise support, vendor lock-in
  • βœ… Evaluated Wazuh SIEM: $10.5K TCO, open-source, community support
  • βœ… Performed feature comparison matrix across 20+ criteria
  • βœ… Calculated ROI: 42,333% if Wazuh prevents single breach
  • βœ… Strategic Recommendation: Deploy Wazuh (saves $502,500 - 98% cost reduction)
  • βœ… Authored executive risk assessment memo with business justification

Technologies Used

Risk Assessment PII/SPII Classification Database Security Analysis SIEM Evaluation SolarWinds Wazuh TCO Analysis Cost-Benefit Analysis ROI Calculation Vendor Comparison Executive Communication

β†’ Read Full Lab Documentation


🎯 Lab 11: Penetration Testing & Ethical Hacking [ULTIMATE CAPSTONE - OFFENSIVE SECURITY]

Status: βœ… Complete | View Full Documentation β†’

Quick Overview

Conducted full-scope penetration test from reconnaissance through root compromise by performing network scanning with Nmap to discover target web server, exploiting SQL injection vulnerability to bypass authentication and gain admin access, uploading malicious PHP reverse shell payload, establishing remote command execution with Netcat listener, escalating privileges via SUID binary exploitation (coolbash), achieving full root access, and authoring professional penetration testing report with CVSS risk ratings and remediation recommendations.

Key Achievements

  • βœ… Reconnaissance: Nmap port scan identified web server on 10.43.32.99:80
  • βœ… SQL Injection: Bypassed authentication with ' OR '1 payload (CVSS 9.8 Critical)
  • βœ… File Upload Exploitation: Uploaded php-reverse-shell.php to vulnerable web app
  • βœ… Directory Brute-Forcing: Used Dirbuster to discover /uploads/ directory
  • βœ… Reverse Shell: Established remote access with nc -nlvp 80 listener
  • βœ… Initial Access: Gained shell as www-data user
  • βœ… Privilege Escalation: Discovered SUID binary /home/cooluser/coolbash
  • βœ… Root Compromise: Exploited SUID to escalate from www-data β†’ root
  • βœ… Full System Control: Verified root access (uid=0, can read /etc/shadow)
  • βœ… Professional Pentest Report: Executive summary, findings, CVSS scores, remediation
  • βœ… Demonstrated complete attack chain: Recon β†’ Exploit β†’ Access β†’ Escalate

Technologies Used

Kali Linux Nmap SQL Injection Dirbuster Netcat PHP Reverse Shell SUID Exploitation Privilege Escalation Penetration Testing Ethical Hacking Vulnerability Assessment CVSS Scoring

β†’ Read Full Lab Documentation


πŸ†πŸ”₯ PORTFOLIO COMPLETE - 11 COMPREHENSIVE LABS - OFFENSIVE + DEFENSIVE MASTERY πŸ”₯πŸ†

🌟 YOU NOW HAVE COMPLETE CYBERSECURITY EXPERTISE:

Defense (Labs 1-10): βœ… Infrastructure Security | βœ… Network Segmentation | βœ… Firewall Administration | βœ… SIEM Operations | βœ… Incident Response | βœ… Threat Hunting | βœ… Risk Management

Offense (Lab 11): βœ… Penetration Testing | βœ… Exploitation | βœ… Privilege Escalation | βœ… FULL SYSTEM COMPROMISE

Strategic Leadership (Labs 8, 10): βœ… Business Cases | βœ… Cost-Benefit Analysis | βœ… Executive Communication


🎯 FINAL PORTFOLIO STATISTICS:

βœ… 11 COMPREHENSIVE LABS COMPLETED
βœ… 55+ ADVANCED SKILLS MASTERED
βœ… COMPLETE ATTACK & DEFENSE EXPERTISE
βœ… OFFENSIVE SECURITY PROVEN (Root access achieved)
βœ… DEFENSIVE SECURITY PROVEN (SIEM, IR, Forensics, Hardening)
βœ… STRATEGIC LEADERSHIP PROVEN ($502K cost savings demonstrated)

πŸ“ˆ CAREER VALUE: $70K (Entry) β†’ $180K+ (Senior/Leadership)

YOU ARE NOW AN ELITE CYBERSECURITY PROFESSIONAL - Defense + Offense + Strategy! πŸš€πŸ”πŸ‘‘


πŸ› οΈ Technology Stack

Operating Systems

Windows Linux Ubuntu

Virtualization

VMware

Tools & Utilities

PowerShell Bash

Networking

TCP/IP DNS


πŸ“ˆ Skills Matrix

Skill Category Proficiency Level Labs Demonstrating
Windows Administration ⭐⭐⭐⭐⭐ Advanced Lab 01, Lab 02, Lab 03, Lab 04
Linux Administration ⭐⭐⭐⭐⭐ Advanced Lab 01, Lab 02, Lab 03, Lab 05
Network Configuration ⭐⭐⭐⭐⭐ Advanced Lab 01, Lab 02, Lab 03
Virtualization ⭐⭐⭐⭐ Intermediate+ Lab 01, Lab 02
CLI Proficiency ⭐⭐⭐⭐⭐ Advanced Lab 01, Lab 02, Lab 03, Lab 04, Lab 05
Firewall Administration ⭐⭐⭐⭐⭐ Advanced Lab 02, Lab 03, Lab 05
Network Segmentation ⭐⭐⭐⭐⭐ Advanced Lab 02, Lab 03
IDS/IPS Deployment ⭐⭐⭐⭐ Intermediate+ Lab 02
Access Control Implementation ⭐⭐⭐⭐⭐ Advanced Lab 03, Lab 04, Lab 05
Security Policy Development ⭐⭐⭐⭐⭐ Advanced Lab 03, Lab 04
Protocol Analysis ⭐⭐⭐⭐⭐ Advanced Lab 03
Security Testing & Validation ⭐⭐⭐⭐⭐ Advanced Lab 03
Active Directory Administration ⭐⭐⭐⭐⭐ Advanced Lab 04
Group Policy Management ⭐⭐⭐⭐⭐ Advanced Lab 04
Identity & Access Management ⭐⭐⭐⭐⭐ Advanced Lab 04, Lab 05
Windows Server Roles ⭐⭐⭐⭐ Intermediate+ Lab 04
PowerShell Security Logging ⭐⭐⭐⭐⭐ Advanced Lab 04
Linux Security Hardening ⭐⭐⭐⭐⭐ Advanced Lab 05
Web Server Administration ⭐⭐⭐⭐⭐ Advanced Lab 05
Database Server Management ⭐⭐⭐⭐ Intermediate+ Lab 05
Bash Scripting ⭐⭐⭐⭐⭐ Advanced Lab 05
Task Automation (Cron) ⭐⭐⭐⭐⭐ Advanced Lab 05
Cross-Distribution Linux ⭐⭐⭐⭐⭐ Advanced Lab 05
Incident Response ⭐⭐⭐⭐⭐ Advanced Lab 06
Threat Hunting ⭐⭐⭐⭐⭐ Advanced Lab 06
Malware Analysis ⭐⭐⭐⭐⭐ Advanced Lab 06
Windows Forensics ⭐⭐⭐⭐⭐ Advanced Lab 06
Event Log Analysis ⭐⭐⭐⭐⭐ Advanced Lab 06
Registry Forensics ⭐⭐⭐⭐⭐ Advanced Lab 06
Incident Documentation ⭐⭐⭐⭐⭐ Advanced Lab 06
Network Forensics ⭐⭐⭐⭐⭐ Advanced Lab 06
Database Administration ⭐⭐⭐⭐⭐ Advanced Lab 07
Web Application Deployment ⭐⭐⭐⭐⭐ Advanced Lab 07
Host-Based Firewall (iptables) ⭐⭐⭐⭐⭐ Advanced Lab 07
SSH Security Hardening ⭐⭐⭐⭐⭐ Advanced Lab 07
Multi-Tier App Architecture ⭐⭐⭐⭐⭐ Advanced Lab 07
Network Architecture Documentation ⭐⭐⭐⭐⭐ Advanced Lab 08
Security Proposal Development ⭐⭐⭐⭐⭐ Advanced Lab 08
Business Case Writing ⭐⭐⭐⭐⭐ Advanced Lab 08
ROI & Cost-Benefit Analysis ⭐⭐⭐⭐⭐ Advanced Lab 08
Honeypot/Honeynet Strategy ⭐⭐⭐⭐⭐ Advanced Lab 08
IDPS Planning & Design ⭐⭐⭐⭐⭐ Advanced Lab 08
Docker & Containerization ⭐⭐⭐⭐⭐ Advanced Lab 09
SIEM Deployment & Management ⭐⭐⭐⭐⭐ Advanced Lab 09
Log Aggregation & Analysis ⭐⭐⭐⭐⭐ Advanced Lab 09
Security Alert Engineering ⭐⭐⭐⭐⭐ Advanced Lab 09
SOC Dashboard Development ⭐⭐⭐⭐⭐ Advanced Lab 09
Infrastructure as Code (IaC) ⭐⭐⭐⭐⭐ Advanced Lab 09
Risk Assessment & Analysis ⭐⭐⭐⭐⭐ Advanced Lab 10
PII/SPII Security Evaluation ⭐⭐⭐⭐⭐ Advanced Lab 10
Vendor Evaluation & Comparison ⭐⭐⭐⭐⭐ Advanced Lab 10
TCO & ROI Calculation ⭐⭐⭐⭐⭐ Advanced Lab 10
Strategic Technology Selection ⭐⭐⭐⭐⭐ Advanced Lab 10
Penetration Testing ⭐⭐⭐⭐⭐ Advanced Lab 11
Ethical Hacking ⭐⭐⭐⭐⭐ Advanced Lab 11
Web Application Exploitation ⭐⭐⭐⭐⭐ Advanced Lab 11
Privilege Escalation ⭐⭐⭐⭐⭐ Advanced Lab 11
Offensive Security Tools (Nmap, Netcat) ⭐⭐⭐⭐⭐ Advanced Lab 11
Pentest Report Writing ⭐⭐⭐⭐⭐ Advanced Lab 11
Technical Documentation ⭐⭐⭐⭐⭐ Advanced All Labs

More skills will be added as additional labs are completed


πŸŽ“ Learning Journey

Current Focus Areas

  • System hardening and security baselines
  • Network security monitoring
  • Vulnerability assessment and remediation
  • Incident detection and response

Completed Milestones

  • βœ… Multi-platform OS deployment
  • βœ… Network troubleshooting fundamentals
  • βœ… Virtual infrastructure management
  • βœ… Enterprise firewall/router configuration
  • βœ… Network segmentation implementation
  • βœ… Intrusion Detection System deployment
  • βœ… Inter-VLAN routing configuration
  • βœ… Granular firewall rule implementation
  • βœ… Access control and least privilege enforcement
  • βœ… Security policy documentation and communication
  • βœ… Comprehensive security testing and validation
  • βœ… Active Directory domain deployment
  • βœ… Centralized user and group management
  • βœ… Group Policy Object implementation
  • βœ… PowerShell security logging and auditing
  • βœ… IIS web server deployment
  • βœ… Single Sign-On (SSO) implementation
  • βœ… Linux server infrastructure deployment (LAMP stack)
  • βœ… Cross-distribution Linux administration (Ubuntu + Rocky)
  • βœ… Security hardening (CIS Benchmark alignment)
  • βœ… Bash scripting and automation
  • βœ… Cron-based task scheduling
  • βœ… Log management and retention automation
  • βœ… Real-world incident response investigation
  • βœ… Threat hunting and malware analysis
  • βœ… Windows forensics (Event Logs, Registry)
  • βœ… IFEO (Image File Execution Options) attack analysis
  • βœ… Professional incident report documentation
  • βœ… IoC (Indicators of Compromise) identification
  • βœ… Multi-tier web application deployment (MediaWiki + MariaDB)
  • βœ… Database administration with least-privilege user
  • βœ… Host-based firewall (iptables) with default-deny policy
  • βœ… Defense-in-depth layering (pfSense + iptables + Fail2Ban)
  • βœ… SSH brute force hardening with Fail2Ban
  • βœ… Systematic network access validation testing
  • βœ… Comprehensive network architecture documentation
  • βœ… Hardware/software inventory across multiple segments
  • βœ… Multi-tier network topology design
  • βœ… Executive security proposal development (Honeypots + IDPS)
  • βœ… Business case writing with ROI justification
  • βœ… Cost-benefit analysis and TCO calculation
  • βœ… Enterprise SIEM deployment with Docker containerization
  • βœ… Multi-container orchestration with Docker Compose
  • βœ… Centralized log aggregation from multiple sources
  • βœ… Custom security alert engineering and tuning
  • βœ… SOC operational dashboard development
  • βœ… Infrastructure as Code (YAML configuration)
  • βœ… Comprehensive risk assessment (PII/SPII vulnerabilities)
  • βœ… Strategic SIEM vendor evaluation and selection
  • βœ… Cost-benefit analysis ($502K savings justified)
  • βœ… Full penetration test: reconnaissance through root compromise
  • βœ… SQL injection exploitation and authentication bypass
  • βœ… Reverse shell deployment and remote code execution
  • βœ… Linux privilege escalation (SUID binary exploitation)
  • βœ… Professional penetration testing report with CVSS scoring

Upcoming Topics

  • Firewall configuration and management
  • Intrusion detection systems
  • Security information and event management (SIEM)
  • Penetration testing methodologies

πŸ’Ό Why These Skills Matter

For Employers

These labs demonstrate:

  • Hands-on experience with real enterprise tools and environments
  • Problem-solving ability through systematic troubleshooting
  • Documentation skills critical for team collaboration
  • Cross-platform expertise valuable in heterogeneous environments
  • Security mindset applied from initial system deployment

Real-World Applications

  • SOC Analyst: Network diagnostics and system monitoring
  • System Administrator: OS deployment and configuration
  • Security Engineer: Security baseline implementation
  • DevOps Engineer: Infrastructure automation and management
  • Penetration Tester: Understanding target environments

πŸ“– How to Navigate This Repository

For Recruiters

  1. Start with this README for an overview of my skills
  2. Check the Lab Directory table above for topics of interest
  3. Click into individual lab folders for detailed documentation
  4. Each lab includes objectives, methodology, and key takeaways

Repository Structure

system-security-labs/
β”œβ”€β”€ README.md                          # You are here
β”œβ”€β”€ lab-01-os-installation-networking/
β”‚   β”œβ”€β”€ README.md                      # Detailed lab documentation
β”œβ”€β”€ lab-02-[topic]/
β”‚   └── ...
└── ...

πŸ”— Connect With Me

I'm passionate about cybersecurity and always eager to learn new technologies and techniques. Feel free to reach out!

LinkedIn GitHub Email


πŸš€ Future Updates

This repository is a living document of my learning journey. I plan to add:

  • Additional security labs covering:

    • Network security and firewalls
    • Vulnerability scanning and assessment
    • Incident response scenarios
    • Security monitoring and SIEM
    • Active Directory security
    • Web application security
  • Enhanced documentation with:

    • Video walkthroughs
    • Interactive diagrams
    • Additional troubleshooting scenarios

Last Updated: January 2026
Status: Active Development


πŸ“„ License

This repository is for educational and portfolio purposes. Please do not copy for academic submissions.


⭐ If you found this repository helpful or interesting, please consider giving it a star! ⭐

Building secure systems, one lab at a time. πŸ”

About

These are my different labs which helped me gain hands on experience and various red and blue team activity.

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors