Thank you for taking the time to view my website. Below is a list of resources linked to different categories that represent my specific skill sets.


Category - Electrical Work

Electrical Pre Trade LVL 3

Many practical subjects covered in this course has added much value in part-time work as a junior security technician with Advanced Security. ----> Learning about relays helped me understand how to wire inputs and outputs for exit buttons, EDRs, PIRs, mag clamps, and electronic locks. Understanding how circuits are wired in series and parallel, aided in successfully wiring an EDR's N/C relay in series with an auto-door open relay to unlock the door. Building many small circuits, and a basic domestic circuit, I could see the materials and tools both security technicians and electricians require to carry out the work efficiently.

Go to article  

Electrical work at rest home

Simple electrical work at a rest home, replacing outlets, fixing bell, new light switch, test & tag.

Go to article  

Category - AWS

AWS cloud practitioner

After receiving the CCNA I will be studying for the AWS cloud practitioner to have a good understanding of how AWS works.

Go to certification  

Category - Networking

AWS cloud practitioner

After receiving the CCNA I will be studying for the AWS cloud practitioner to have a good understanding of how AWS works.

Go to certification  

Comptia Security +

I am currently studying for the Security+ to validate my foundational cyber security skills and knowledge on how to properly secure systems from external threats

Go to certification  

Basic switch configuration

This packet tracer scenario includes setting up a hostname and an IP address, MOTD banner, MD5 hashed passwords, and telnet access to a Cisco catalyst 2960 switch from a remote computer. This is a lab from `www.packettracernetwork.com`.

Go to article  

Authentication & access control

The primary technology that firewalls use for filtering traffic is Access Control Lists. ACLs are typically maintained through a router and filter packets based on the requesting device's source or destination IP address.

Go to article  

Network adapters

A list of cable types and network adapters

Go to article  

Networking hardware & concepts

A list of network devices and hardware including diagrams and more info

Go to article  

Cisco - CCNA

I will be studying for the CCNA after I receive the Security+

Go to certification  

Network Address Translation - NAT

Network Address Translation (NAT) is a networking technique used for modifying IP address information in packet headers while in transit across a routing device. The primary use of NAT is to allow multiple devices on a local network to access external networks, like the internet, using a single public IP address.

Go to article  

Using statistics and sensors to ensure network availability

Gathering information from network devices is mandatory to ensure your devices are functioning correctly.

Go to article  

Switching & VLANs

This article will cover switches at the Data Link layer, as well as VLANs for splitting up broadcast domains and segmenting networks in packet tracer.

Go to article  

Wireless LANs

This will cover basic WLAN standards and encryption methods.

Go to article  

CompTIA Network +

Code: PNLJXH7T2FE41WWF Verify at: http://verify.CompTIA.org This article will cover why I have chosen to do the Network+ exam, and what I have learned from passing the Network+

Go to certification  

Spanning Tree Protocol

Spanning Tree Protocol is a complex loop prevention algorithm that is used for fault tolerant distrusted switches. This article will cover STP in depth

Go to article  

RIP, OSPF, EIGRP & BGP network scenarios

These are all network scenarios I have created in packet tracer to help me understand how RIP, OSPF, EIGRP & BGP

Go to article  

Network threats & mitigation

This article will describe common network threats and mitigation techniques for the Network+ exam.

Go to article  

Category - Cyber security

Proxmox home lab

This article will go over how to configure an automated home lab using Proxmox, Packer, Ansible, Terraform and Vault for secrets. This could be used for malware analysis, a SOC lab, performing penetration tests against Windows AD environments and Linux servers, performing penetration tests against deliberately vulnerable web applications, setting up AD environments, testing operating systems, and much more.

Go to project  

Comptia Security +

I am currently studying for the Security+ to validate my foundational cyber security skills and knowledge on how to properly secure systems from external threats

Go to certification  

Category - Web vulnerabilities

Proxmox home lab

This article will go over how to configure an automated home lab using Proxmox, Packer, Ansible, Terraform and Vault for secrets. This could be used for malware analysis, a SOC lab, performing penetration tests against Windows AD environments and Linux servers, performing penetration tests against deliberately vulnerable web applications, setting up AD environments, testing operating systems, and much more.

Go to project  

Comptia Security +

I am currently studying for the Security+ to validate my foundational cyber security skills and knowledge on how to properly secure systems from external threats

Go to certification  

Websockets

Websockets provide a full-duplex communication channel over a single, long-lived connection between a client and a server on the web, enabling real-time data exchange. This article shows how to exploit websockets

Go to article  

HTTP smuggling

HTTP smuggling is a web vulnerability that allows an attacker to interfere with the way a web server handles the stream of HTTP requests from users

Go to article  

CSRF attack vectors

CSRF is a vulnerability that allows an attacker to make requests from an external domain controlled by them. Then calls an endpoint for a vulnerable website that a victim has an account on, then uses the server to complete actions not intended by the victim.

Go to article  

CORS vulnerabilities

This article will cover CORS and how to protect your website against CORS vulnerabilities. CORS involves modifying the Origin header, and many more complex methods.

Go to article  

Category - Ansible

Proxmox home lab

This article will go over how to configure an automated home lab using Proxmox, Packer, Ansible, Terraform and Vault for secrets. This could be used for malware analysis, a SOC lab, performing penetration tests against Windows AD environments and Linux servers, performing penetration tests against deliberately vulnerable web applications, setting up AD environments, testing operating systems, and much more.

Go to project  

Category - Dev-ops

Proxmox home lab

This article will go over how to configure an automated home lab using Proxmox, Packer, Ansible, Terraform and Vault for secrets. This could be used for malware analysis, a SOC lab, performing penetration tests against Windows AD environments and Linux servers, performing penetration tests against deliberately vulnerable web applications, setting up AD environments, testing operating systems, and much more.

Go to project  

Category - Next.js

webfirst.co.nz - Web Development NZ

Small web development business I have tried to start. Built with Next.js, I have one client (firesidecandles.co.nz)

Go to project  

firesidecandles.co.nz - ecommerce

firesidecandles.co.nz is an e-commerce website built with Next.js, Redux and Strapi as the CMS.

Go to project  

Category - JavaScript

Crypto trading application

This is a crypto trading application made with Node.js, React, Redux, and MongoDB

Go to project  

firesidecandles.co.nz - ecommerce

firesidecandles.co.nz is an e-commerce website built with Next.js, Redux and Strapi as the CMS.

Go to project  

Category - React.js

Crypto trading application

This is a crypto trading application made with Node.js, React, Redux, and MongoDB

Go to project  

firesidecandles.co.nz - ecommerce

firesidecandles.co.nz is an e-commerce website built with Next.js, Redux and Strapi as the CMS.

Go to project  

Category - Redux

Crypto trading application

This is a crypto trading application made with Node.js, React, Redux, and MongoDB

Go to project  

firesidecandles.co.nz - ecommerce

firesidecandles.co.nz is an e-commerce website built with Next.js, Redux and Strapi as the CMS.

Go to project  

Category - Node.js

Crypto trading application

This is a crypto trading application made with Node.js, React, Redux, and MongoDB

Go to project  

Category - MongoDB

Crypto trading application

This is a crypto trading application made with Node.js, React, Redux, and MongoDB

Go to project  

Category - C programming

Simple functions in C

Completing some exercises from the book "Brian Kernighan and Dennis Ritchie - The C Programming Language-Prentice". First exercise.

Go to article  

Category - Strapi

firesidecandles.co.nz - ecommerce

firesidecandles.co.nz is an e-commerce website built with Next.js, Redux and Strapi as the CMS.

Go to project  

Get in touch

logo

Send an email to beren.boden@proton.me. I will get back to you within 24 hours.