angierico_qn72oj

RESOLVING RDP CONNECTIVITY ISSUE

This lab tackles an RDP connectivity issue, guiding users through the process of adjusting settings on their machines to enable remote connections. By following these instructions, the objective was to acquire practical experience in system settings, troubleshoot RDP issues, and ensure seamless connectivity for remote access. Here is a detailed guide to resolving this RDP …

RESOLVING RDP CONNECTIVITY ISSUE Read More »

CHANGING BROWSER SEARCH ENGINE IN CHROME

This lab is designed to provide hands-on experience in changing the default search engine in the Chrome browser. By following these steps, the goal is to gain practical knowledge in navigating browser settings, modifying search engine preferences, and confirming changes. This scenario replicates a common user request, enhancing troubleshooting skills related to browser customization. Here …

CHANGING BROWSER SEARCH ENGINE IN CHROME Read More »

VULNERABILITY MANAGEMENT

Vulnerability management is a crucial practice in information security, involving a cyclical process of identifying, classifying, prioritizing, remediating, and mitigating software vulnerabilities. This practice helps organizations maintain a low overall risk level. To gain practical experience in vulnerability management, I set up a virtual environment for conducting vulnerability scans.  This environment included Nessus Essentials, VW …

VULNERABILITY MANAGEMENT Read More »

computer, security, padlock-1591018.jpg

FILE INTEGRITY MONITOR

In this project, I focussed on Integrity, one of the pillars of the CIA triad, to get a better intuition about this concept. I created a basic File Integrity Monitor FIM in PowerShell to monitor a set of selected files. The FIM detects if any of the files have been altered or deleted or if …

FILE INTEGRITY MONITOR Read More »

SIEM PROJECT

With the aim of obtaining more exposure to a SIEM, I completed a project in which a virtual machine VM acted as a honeypot to attract attacks from different IP addresses located in different regions worldwide. The data from those attacks was extracted from Windows event viewer and logged using a log work analytics in …

SIEM PROJECT Read More »