Projects

...
Incident Response & Recovery
Lab

How the fortress recovers. Practiced containment, playbooks, and recovery steps to reduce downtime and control breaches.

...
Zero Trust Enforcement
Lab

Who can move inside. Proved enforcement of conditional access, device compliance, and micro segmentation to block lateral movement.

...
Key Management
Lab

Secured encryption keys and secrets to prove who holds the keys controls the system.

...
Identity & Access Management
Lab

Enforced authentication and authorization by controlling users, groups, and policies.

...
Detection & Logging Management
Lab

Monitored sign-ins, audit logs, and device compliance to prove visibility into who did what, when.