- Built a complete Active Directory environment from scratch
- Deployed and configured Splunk for security log analysis
- Conducted controlled testing using Kali Linux
- Implemented Atomic Red Team for adversary simulation
- Applied practical experience in security monitoring and analysis
Stage 1
Stage 2
Stage 3
Stage 4
Stage 5