Thank you for taking the time to view my website. Below is a list of resources linked to different categories that represent my specific skill sets.
Category - Electrical Work
Electrical Pre Trade LVL 3
Many practical subjects covered in this course has added much value in part-time work as a junior security technician with Advanced Security. ----> Learning about relays helped me understand how to wire inputs and outputs for exit buttons, EDRs, PIRs, mag clamps, and electronic locks. Understanding how circuits are wired in series and parallel, aided in successfully wiring an EDR's N/C relay in series with an auto-door open relay to unlock the door. Building many small circuits, and a basic domestic circuit, I could see the materials and tools both security technicians and electricians require to carry out the work efficiently.
Electrical work at rest home
Simple electrical work at a rest home, replacing outlets, fixing bell, new light switch, test & tag.
Category - AWS
AWS cloud practitioner
After receiving the CCNA I will be studying for the AWS cloud practitioner to have a good understanding of how AWS works.
Category - Networking
AWS cloud practitioner
After receiving the CCNA I will be studying for the AWS cloud practitioner to have a good understanding of how AWS works.
Comptia Security +
I am currently studying for the Security+ to validate my foundational cyber security skills and knowledge on how to properly secure systems from external threats
Basic switch configuration
This packet tracer scenario includes setting up a hostname and an IP address, MOTD banner, MD5 hashed passwords, and telnet access to a Cisco catalyst 2960 switch from a remote computer. This is a lab from `www.packettracernetwork.com`.
Authentication & access control
The primary technology that firewalls use for filtering traffic is Access Control Lists. ACLs are typically maintained through a router and filter packets based on the requesting device's source or destination IP address.
Networking hardware & concepts
A list of network devices and hardware including diagrams and more info
Network Address Translation - NAT
Network Address Translation (NAT) is a networking technique used for modifying IP address information in packet headers while in transit across a routing device. The primary use of NAT is to allow multiple devices on a local network to access external networks, like the internet, using a single public IP address.
Using statistics and sensors to ensure network availability
Gathering information from network devices is mandatory to ensure your devices are functioning correctly.
Switching & VLANs
This article will cover switches at the Data Link layer, as well as VLANs for splitting up broadcast domains and segmenting networks in packet tracer.
CompTIA Network +
Code: PNLJXH7T2FE41WWF Verify at: http://verify.CompTIA.org This article will cover why I have chosen to do the Network+ exam, and what I have learned from passing the Network+
Spanning Tree Protocol
Spanning Tree Protocol is a complex loop prevention algorithm that is used for fault tolerant distrusted switches. This article will cover STP in depth
RIP, OSPF, EIGRP & BGP network scenarios
These are all network scenarios I have created in packet tracer to help me understand how RIP, OSPF, EIGRP & BGP
Network threats & mitigation
This article will describe common network threats and mitigation techniques for the Network+ exam.
Category - Cyber security
Proxmox home lab
This article will go over how to configure an automated home lab using Proxmox, Packer, Ansible, Terraform and Vault for secrets. This could be used for malware analysis, a SOC lab, performing penetration tests against Windows AD environments and Linux servers, performing penetration tests against deliberately vulnerable web applications, setting up AD environments, testing operating systems, and much more.
Comptia Security +
I am currently studying for the Security+ to validate my foundational cyber security skills and knowledge on how to properly secure systems from external threats
Category - Web vulnerabilities
Proxmox home lab
This article will go over how to configure an automated home lab using Proxmox, Packer, Ansible, Terraform and Vault for secrets. This could be used for malware analysis, a SOC lab, performing penetration tests against Windows AD environments and Linux servers, performing penetration tests against deliberately vulnerable web applications, setting up AD environments, testing operating systems, and much more.
Comptia Security +
I am currently studying for the Security+ to validate my foundational cyber security skills and knowledge on how to properly secure systems from external threats
Websockets
Websockets provide a full-duplex communication channel over a single, long-lived connection between a client and a server on the web, enabling real-time data exchange. This article shows how to exploit websockets
HTTP smuggling
HTTP smuggling is a web vulnerability that allows an attacker to interfere with the way a web server handles the stream of HTTP requests from users
CSRF attack vectors
CSRF is a vulnerability that allows an attacker to make requests from an external domain controlled by them. Then calls an endpoint for a vulnerable website that a victim has an account on, then uses the server to complete actions not intended by the victim.
CORS vulnerabilities
This article will cover CORS and how to protect your website against CORS vulnerabilities. CORS involves modifying the Origin header, and many more complex methods.
Category - Ansible
Proxmox home lab
This article will go over how to configure an automated home lab using Proxmox, Packer, Ansible, Terraform and Vault for secrets. This could be used for malware analysis, a SOC lab, performing penetration tests against Windows AD environments and Linux servers, performing penetration tests against deliberately vulnerable web applications, setting up AD environments, testing operating systems, and much more.
Category - Dev-ops
Proxmox home lab
This article will go over how to configure an automated home lab using Proxmox, Packer, Ansible, Terraform and Vault for secrets. This could be used for malware analysis, a SOC lab, performing penetration tests against Windows AD environments and Linux servers, performing penetration tests against deliberately vulnerable web applications, setting up AD environments, testing operating systems, and much more.
Category - Next.js
webfirst.co.nz - Web Development NZ
Small web development business I have tried to start. Built with Next.js, I have one client (firesidecandles.co.nz)
firesidecandles.co.nz - ecommerce
firesidecandles.co.nz is an e-commerce website built with Next.js, Redux and Strapi as the CMS.
Category - JavaScript
Crypto trading application
This is a crypto trading application made with Node.js, React, Redux, and MongoDB
firesidecandles.co.nz - ecommerce
firesidecandles.co.nz is an e-commerce website built with Next.js, Redux and Strapi as the CMS.
Category - React.js
Crypto trading application
This is a crypto trading application made with Node.js, React, Redux, and MongoDB
firesidecandles.co.nz - ecommerce
firesidecandles.co.nz is an e-commerce website built with Next.js, Redux and Strapi as the CMS.
Category - Redux
Crypto trading application
This is a crypto trading application made with Node.js, React, Redux, and MongoDB
firesidecandles.co.nz - ecommerce
firesidecandles.co.nz is an e-commerce website built with Next.js, Redux and Strapi as the CMS.
Category - Node.js
Crypto trading application
This is a crypto trading application made with Node.js, React, Redux, and MongoDB
Category - MongoDB
Crypto trading application
This is a crypto trading application made with Node.js, React, Redux, and MongoDB
Category - C programming
Simple functions in C
Completing some exercises from the book "Brian Kernighan and Dennis Ritchie - The C Programming Language-Prentice". First exercise.
Category - Strapi
firesidecandles.co.nz - ecommerce
firesidecandles.co.nz is an e-commerce website built with Next.js, Redux and Strapi as the CMS.