Over the past few months, I built a fully virtualized home lab designed to mimic a real SOC environment combining offensive testing, defensive monitoring, and layered security.
It gives me hands-on experience in threat hunting, network defense, alert correlation, and overall SOC workflows
🔧 Lab Setup Includes:
•🐉 Kali Linux – Recon & exploitation
•🐧 Ubuntu (Wazuh) – SIEM for monitoring & correlation
•🛡 pfSense – Firewall + segmentation
•🧪 Suricata IDS/IPS – Threat detection & active blocking
•🪟 Windows Server AD – Domain & user management
•🎯 Metasploitable – Vulnerable target for testing
🎯 Key Achievements:
•🚨 Detected Nmap stealth scans with custom Suricata rules
•🚫 Blocked malicious traffic using IPS mode
•🔐 Identified brute-force attempts via Wazuh alerts
•🕵️♂️ Flagged Mimikatz credential dumping (MITRE T1003.001)
•🔄 Correlated pfSense → Suricata → Wazuh logs for validation
•🛡 Set up FIM, vulnerability scans, and log-based detections
•📊 Built a practical layered defense similar to real SOC environments
🔗 Open to connecting with SOC analysts, cybersecurity pros, and recruiters let’s collaborate and grow together
Cybersecurity isn’t just about certifications it’s about real-world skills. I’ve curated 100+ projects that let you tackle Red & Blue Team scenarios, incident response, and threat analysis just like in a real SOC.
What You’ll Gain:
🔹 Practical Red & Blue Team experience
🔹 Real-world detection, analysis & response skills
🔹 Hands-on use of popular cybersecurity tools
🔹 Portfolio-ready projects for job interviews
DNS (Domain Name System) is basically the 📖 phone book of the internet.
It translates human-friendly domain names (like ) into machine readable IP addresses (like 142.250.190.78) so computers can find each other across the network. google.com
🧠 Why Do We Need DNS?
Humans remember names easily not numbers
Instead of typing an IP address every time, you just enter a domain name, and DNS automatically finds the right IP for you. ✨
⚙️ How DNS Works (Step-by-Step)
1️⃣ You type a website name →
2️⃣ 💾 Local Cache Check: Your computer first checks its local DNS cache (recently visited sites)
3️⃣ 🌍 DNS Resolver: If not found it asks a DNS resolver (like your ISP or Google’s DNS — 8.8.8.8)example.com
A firewall is a network security device or software designed to monitor, filter, and control incoming and outgoing network traffic according to predefined security rules.
💡 Comment PDF for full guide
Its main goal is to create a protective barrier between a trusted internal network and untrusted external networks, such as the internet, safeguarding systems from unauthorized access and cyber threats
🔹 Purpose of a Firewall
•Protects computers and networks from malware, hackers, and unauthorized intrusions.
•Ensures that only legitimate and safe data traffic passes through.
•Serves as the first line of defense in any network security architecture
🔐 Ethical Hacking Uncovered The Complete Beginner-Friendly Guide
Cybersecurity isn’t optional anymore it’s the backbone of digital safety in today’s world.
📩 Comment “PDF” for the full guide.
💡 What You’ll Learn:
✅ How cyber attacks actually happen
✅ How ethical hackers defend systems
✅ The real penetration testing workflow
✅ Essential tools inside Kali Linux
✅ Google Dorking & reconnaissance fundamentals
✅ Malware, phishing, and modern cyber threats
✅ How to start your career in cybersecurity
If you’re planning to grow in Ethical Hacking or Cybersecurity, this is a solid starting point.
📘 Resource: Ethical Hacking Learning Penetration Testing with Kali Linux
🚀 New Release: Personal Git Mastery
📩 Comment “PDF” below to get your copy!
Whether you’re a beginner trying to tame Git or an educator looking for a structured, pedagogy-first resource this book is built for fearless learners
📘 From “Hello World” to branching, merging, and rebasing, every chapter is an actionable step.
🎮 Includes a fun mini game “Error Hunter” that gamifies common Git mistakes
🧠 What makes it different:
•Focus on the version control mindset, not just commands
•Pedagogical strategies for teaching Git effectively
•GitHub Codespaces integration for cloud-based practice
•Project hygiene and debugging best practices