PinnedSetting Up Wazuh Home Lab: Part 1 — Preparing the EnvironmentIn today’s rapidly evolving digital landscape, the importance of robust cybersecurity measures cannot be overstated. Every day, businesses…Jul 9Jul 9
Investigate Web Attack — WalkthroughIn this post, I’ll be walking you through an exciting challenge I tackled on LetsDefend, a platform designed to improve cybersecurity…2d ago2d ago
Building an Active Directory LabIn this blog, I’ll walk you through the process of setting up an Active Directory lab environment, featuring tools like Splunk, Kali Linux…Oct 21Oct 21
Building a SIEM Home Lab with Elastic and Kali VMIn today’s digital landscape, the ability to analyze and respond to security incidents is crucial for any cybersecurity professional. This…Sep 25Sep 25
Setting Up Wazuh Home Lab: Part 3 — File Integrity Monitoring (FIM)In this part, we will explore the implementation of File Integrity Monitoring (FIM) using Wazuh. FIM is a crucial aspect of security…Sep 22Sep 22