Hands-on cybersecurity projects covering threat analysis, incident response, vulnerability research, and compliance frameworks.
A detailed journal documenting my progress through TryHackMe rooms and challenges. Covers networking fundamentals, Linux privilege escalation, web exploitation, and CTF walkthroughs with methodology notes and key takeaways.
A structured log of incident response scenarios — documenting detection, analysis, containment, eradication, and recovery phases. Built from simulated security events to practice and refine IR processes and playbook creation.
Security assessments of intentionally vulnerable systems and environments. Focuses on identifying misconfigurations, weak access controls, unpatched services, and other common attack vectors — with documented remediation strategies.
Practical compliance checklists mapped to industry-standard security frameworks like NIST and ISO 27001. Designed to help organizations systematically evaluate their security posture and meet regulatory requirements.