Projects-Summary

Project Index & Summaries

A comprehensive directory of hands-on projects, technical guides, and research.

Cyber Security & Pentesting

  • Ethical Hacking Notes: A deep dive into the world of ethical hacking. This guide covers the complete malware analysis process, footprinting, reconnaissance, and system hacking. It includes specialized modules on hacking IoT devices, cloud computing, and wireless networks.
  • Pentesting Hands-on: Documentation of real-world penetration testing experiences. It follows the five stages of ethical hacking: Reconnaissance, Enumeration, Exploitation, and Reporting. It also includes instructions on building your own vulnerable machines for practice.
  • Hack The Box Notes: Methodologies focused on auditing websites and machines. This section provides a workflow for checking vulnerabilities and testing web security using the Hack The Box platform.
  • Wireshark Basics: Practical network analysis using Wireshark. Learn to save captured packets as .pcapng files, use advanced filters for data streamlining, and interpret geographical data via the MaxMind database.
  • Network & Cloud Security: An exploration of network cloud frameworks. This section covers NMAP techniques, SQL injection, backdoor attacks, and how to implement Intrusion Prevention Modes using SNORT.
  • Kali Linux Projects: Notes on using Kali Linux tools for network security. Includes guides on dual-booting with Windows and setting up a Pi-hole + Unbound DNS sinkhole for network-wide ad blocking.

GRC & Professional Standards

  • ISO 27001 & 27002: A guide to Information Security Management Systems. Learn how to implement frameworks based on the three pillars: Confidentiality, Integrity, and Availability.
  • ISO 9001 & AS9100: A comparison between general quality management and aerospace-specific requirements. This section highlights the additional controls needed for AS9100 compliance.
  • CISA Cert Prep: Comprehensive preparation for the CISA exam. Covers auditing information systems, IT governance, lifecycle management, and information asset protection.
  • Risk Management: Insights into demystifying risk management. Learn how to recognize risks in an IT environment and develop effective strategies for mitigation.
  • Security Audit Overview: A walkthrough of GRC auditing. Covers security assessment reviews, identifying targets, planning technical assessments, and post-testing activities.

Data Science & AI

  • Llama AI & Fabric: Using the Fabric framework to augment human capabilities. This guide shows how to extract YouTube transcripts, generate AI summaries, and run OLLAMA AI models locally.
  • Data Analytics Series: An introduction to transforming raw data into insights. Includes practice examples for data cleaning and analysis across multiple parts.
  • Interactive Dashboards: Learn to build sample dashboards using Excel pivot tables and graphs. Includes comparisons between tools like Power BI and Tableau for professional visualization.
  • SQL Basics: Fundamental to advanced SQL training. Learn to manage data, write efficient queries, and understand database relationships.

Home Lab & Infrastructure

  • Home Assistant on OMV: Installing Home Assistant on a Raspberry Pi using OMV Compose. Includes the setup of MQTT, Portainer, and Jellyfin for a complete home server.
  • Docker HomePage: Setting up a unified "HomePage" dashboard using Docker Compose. Covers widget configuration and best practices for managing multiple self-hosted services.
  • DevOps Hands-On: Practical cloud infrastructure deployment. Includes deploying Azure VMs with Terraform and setting up monitoring using Prometheus and Grafana.
  • Custom PC Building: A step-by-step guide to assembling PC components. Includes how to use PC Part Picker, connecting SATA cables, and front panel connector setup.
  • PC Troubleshooting: A guide for desktop repair. Covers booting configurations, Clonezilla for Windows installation, partition management, and RJ45 diagramming.

Digital Forensics & Privacy

  • PC Forensics: Learn the science of search and seizure. This section covers forensic imaging, image acquisition, and analyzing files to solve digital mysteries.
  • Mobile Forensics: Evidence recovery from mobile devices. Learn to analyze timelines for Facebook, SMS, and WhatsApp, and explore hidden data using the PixelKnot app.
  • Windows Privacy Optimization: Securing a Windows installation by disabling Co-pilot, telemetry, and tracking. Includes host file modifications to block Microsoft services.
  • WhatsApp Privacy: Best practices for mobile communication security. Learn how to manage settings to protect your data from being harvested.

Law & UK Immigration

  • Indian Bare Acts: A structured reference for major Indian laws, including the Indian Penal Code (IPC), Code of Criminal Procedure (CrPC), and Indian Evidence Act.
  • UK Student Visa Guide: A checklist for students preparing to move to the UK. Includes notes on plagiarism and using Turnitin to check document similarity scores.
  • UK Driving Practice: A unique method for mastering UK driving test routes. Learn how to practice specific local routes using Google Maps to improve your test success rate.
  • Hindu Marriage Act: A breakdown of legal requirements for marriage registration and personal laws in India.

General & Career

  • S.T.A.R Interview Method: Mastering behavioral interviews. Learn how to describe the Situation, Task, Action, and Result to quantify your professional achievements.
  • Portfolio & Infographics: A visual summary of my technical journey. Includes infographics that explain complex security concepts and project timelines.
  • Useful Web Resources: A curated list of websites for tools, learning, and productivity that I use in my daily technical workflow.

Comments

Popular Posts

HOME LAB : HANDS-ON

Marriage Registration Online steps [Tamil Nadu]

Multifactor authentication Updated for 2024