Obsessed with all things tech
Greetings! My name is Evan and I love all things tech whether that be security, networks, gaming. You name it, I am interested!
Greetings! My name is Evan and I love all things tech whether that be security, networks, gaming. You name it, I am interested!
Update!: Welcome to yet another update in my journey. I have embarked on a new journey to gain the HTB Certified Defensive Security Analyst (HTB CDSA) certification to advance my knowledge within the field of cybersecurity. I am currently in the process of studying for the exam and plan to...
A summarized description of this project is: Understanding and analyzing a recent Cyber Security breach. The goal is to find a solution through a tool, protocol/policy, and to discuss vulnerability protection behaviors that can be demonstrated to prevent these attacks. The breach of choice: The type of breach I chose...
Introduction In this project, I built a mini honeynet in Azure and ingest log sources from various resources into a Log Analytics workspace, which is then used by Microsoft Sentinel to build attack maps, trigger alerts, and create incidents. I measured some security metrics in the...
Company: Internship Program
Project Overview In this project, I established a secure Azure network and deployed two virtual machines configured to run OpenVAS Vulnerability Management Scanner and Windows 10. To create a deliberately vulnerable environment, the Windows 10 virtual machine was intentionally exposed by disabling security controls and installing...
Company: Internship Program
Project Description: I recently completed an intensive Hack the Box module focused on Splunk, a leading platform in the realm of cybersecurity analytics and threat detection. This project provided me with a deep dive into Splunk's architecture, components, and core functionalities, equipping me with a robust understanding of its capabilities....
Studies included understanding information security concepts. These concepts include the confidentiality, integrity, and availability of online data. Subjects also include privacy, quality, trustworthiness as well as basic cybersecurity practices.