- Cyber Security Labs
- WIP: Microsoft Security & Compliance Platform Lab | Entra ID | Conditional Access | MFA | IAM | IGA | PIM | Intune | Endpoint Security Policies | Purview | DLP | Sensitivity Labels | Data Lifecycle Management | Insider Risk Management | eDiscovery | Communication Compliance | Audit Logs | Zero Trust Architecture
- WIP: Microsoft Sentinel & Defender XDR Lab | Sentinel | Defender XDR | Log Analytics | KQL | Detection Engineering | IR | Threat Hunting | SOAR | Logic Apps | Alert Triage | Security Monitoring
- WIP: Vulnerability Management Programme | Qualys VMDR | Vulnerability Scanning | Asset Inventory | Risk Prioritisation | CVSS | EPSS | Patch Management | Remediation Workflows | SLA Management | MTTR | Vulnerability Reporting | Risk Assessment | Cyber Essentials Plus
- WIP: Network Security Lab | SIEM | IDS | Firewall | Router | Honeypot | DDoS | Ransomware | FIM | Wazuh | Suricata | pfSense | Cowrie
- Vulnerability Management Lab | Nessus Essentials | Internal Security Audit | Full Life Cycle | Technical Reporting
- Website Security Lab | VAPT | Penetration Testing | CVE | CVSS Scoring | Kali Linux | SQL Injection
- Cryptography Lab | CyberChef | Decryption | Encryption
- Cisco Networking Labs
- Identity & Access Management (IAM) Labs
- IAM SSO B2B Lab | Okta | M365 | Entra ID | SSO | Zero Trust | Federation | MFA | IAM | IAG | IAAA | PAM
- Scripting
- Windows Event Log Analyser (Final Year Project) | Python | Log Analysis | EVTX Log Parsing | Automation | Regex
- Secure Password Manager | Java | IAM | Encryption | Decryption | SHA-256 Hashing | Application Security
- Data Structures & Algorithms (DSA) Study Repository
- TryHackMe
- AttackIQ
- Pluralsight
- Microsoft
- Udemy


