Security and Network Management 3
OWASP, WAF protections, iptables, IDS/IPS basics, pentesting roles, firewall duties, brute-force scenarios, and the risk of outdated components.
OWASP, WAF protections, iptables, IDS/IPS basics, pentesting roles, firewall duties, brute-force scenarios, and the risk of outdated components.
Practical response for RAMSV SRL covering malware protection choices, a segmented secure network design with IDS/IPS and VPN, plus cost and timeline estimates for implementation.
An instructional walkthrough that evaluates a Windows administrative workstation, highlights configuration strengths, and pinpoints practical hardening upgrades for GEN.
A step-by-step guide that combines network discovery, vulnerability validation, CVSS-based prioritization, and lightweight monitoring for endpoints and servers inside GEN.
Part 4 delivers a cross-platform monitoring exercise with Python and PowerShell, focusing on log analysis, reporting, and operational safeguards.
An educational walkthrough that translates a Trend Micro Vision One alert into a hands-on analysis of vulnerable agents, missing sensors, and legacy servers inside GEN.
Part 3 teaches how to construct a maintenance script with logging, argument parsing, and cleanup routines to support secure server operations.
Part 2 guides learners through choosing a Linux distro, configuring a lab, and authoring a diagnostic Bash script with secure defaults.
Part 1 introduces foundational Bash automation for security teams through two backup scripts, with guided analysis and hardening advice.
Educational walkthrough of how to document assets, threats, compliance drivers, and security controls for the Argentine AFIP Monotributo portal.
I am available for contract-based collaboration. If you have an interesting project idea, schedule a call via Calendly.
Schedule a 30-min call