top of page

PROJECT PORTFOLIO

Welcome to my Project Portfolio! Here, you’ll find a selection of projects that showcase my expertise in network operations and security. Explore my work, where technical skills and innovative solutions come together to address real-world challenges.

​

​This portfolio is a resource for tech enthusiasts and professionals alike. I share detailed insights, tutorials, and hands-on experiences to foster a community focused on learning and growth.

​

Please note, this portfolio is a work in progress. I’m continuously adding new projects, including some that I’m currently working on. Be sure to check back regularly to see the latest additions as I expand this collection. Together, let’s turn challenges into opportunities, driven by resilience and passion, in a world where technology empowers us all.

Network Traffic Analysis with Wireshark

This project focuses on using Wireshark, a leading network protocol analyzer, to capture and interpret network traffic. The objective was to analyze packet data generated from different web requests, identifying protocols in use, and understanding their role in network communication. By inspecting traffic between a client and a web server, I could distinguish legitimate traffic from potential anomalies, enhancing security visibility.

image.png

Network Security and Vulnerability Assessment with Nmap

In this project, I leveraged Nmap, a powerful network scanning tool, to conduct a comprehensive security assessment. The objective was to identify open ports, detect services running on networked devices, and assess potential vulnerabilities. By utilizing various Nmap commands, I gathered insights into the network's security posture and identified possible areas of improvement.

image.png

Active Directory & DNS Setup for Network Management

In this project, I set up and configured Windows Server 2016 as an Active Directory (AD) and DNS server, integrating a Windows 10 client into the domain. This configuration creates a centralized management structure, allowing secure authentication and streamlined network resource access. This setup demonstrates essential skills in identity management and secure network configuration for a structured IT infrastructure. 

image.png

Firewall and IDS Configuration with pfSense

For this project, I set up and configured the pfSense firewall to secure a network, implementing rules to block specific sites and enhancing monitoring with the Snort Intrusion Detection System (IDS). By controlling network traffic and filtering content, this setup demonstrates foundational security practices to protect organizational assets. This focuses on firewall configuration, network traffic control, and intrusion detection, essential skills for maintaining a secure network infrastructure.

image.png

Vulnerability Assessment with Nessus: Strengthening Network Security

This project involved deploying and configuring Nessus, a powerful vulnerability scanner, to identify security risks on a Windows Server 2016 virtual machine. By running a Nessus scan, I was able to uncover system misconfigurations, weak credentials, and outdated protocols that could be exploited by malicious actors. The Nessus scanner provided detailed insights, categorizing vulnerabilities by severity and offering recommendations for remediation to enhance the server’s security posture.

image.png

Web Application Vulnerability Scanning with N-Stalker

For this project, I deployed N-Stalker, a web application vulnerability scanner, to assess the security posture of a web application named BadStore.net. The objective was to identify critical vulnerabilities such as Cross-Site Scripting (XSS), SQL Injection, and insecure configurations, which are common risks for web applications. The scan provided actionable insights and recommendations for remediation to enhance the application’s defenses.

image.png

Cloud Network Deployment with AWS: Configuring VPCs and EC2 Instances

In this project, I configured and deployed virtual private cloud (VPC) networks and Elastic Compute Cloud (EC2) instances using AWS. The objective was to set up both a default and a custom VPC to understand AWS networking, including IP addressing, subnets, internet gateways, and routing tables. This project highlights skills in cloud networking, AWS VPC configuration, and secure instance deployment within custom network environments.

AWS copy.jpg
Abstract Background

CONTACT ME

If you would like to get in touch, please email me or send a message below.

Thank You for Reaching Out!

“Without effort, your talent is nothing more than unmet potential. Without effort, your skill is nothing more than what you could have done but didn't.”

IG Logo copy.jpg

© 2024 by Mike Santos

bottom of page