Secure Cloud Infrastructure.

The purpose of this secure cloud infrastructure is to create a cloud-base infrastructure to get access to other services. The infrastructure includes three nodes that should be combined in one machine. Nodes are network, compute, and control nodes. These three services should have firewall and intrusion detection to obtain a security on them. The cloud-base…

Red and Blue Team Research

UPDATE: All Research for Red and Blue Team has been completed. A Scenario was also created for Red and Blue Team. A Diagram was also made. This was created to help layout a basic Red and blue Team situation. Project Student: Randall Huber

NetFlow Analysis Server

The client was a network administrator interested in implementing a NetFlow analysis server over their local network for the sake of threat intelligence, or security. By utilizing the internet-traffic session data produced by this server, the client would be able to view information regarding application names, session duration, bandwidth utilization, and more. This information can allow…

Jagwarz Expansion

This project was originally designed to give students challenges based on cyber security frameworks using proprietary code. Further research found a framework that was usable for cyber, web, and database. Currently deploying this for use for faculty, staff, and students. https://github.com/CTFd/CTFd

Security Operations Center

The purpose of this project is to determine if a free, open-source program can function in the role of a Security Operations Center for a Fortune 500 Company.  This program is needed to analyze a network, or multiple networks, for a variety of threats.  It also needs to be able to display alerts from the…

Security Analyst

This project incorporates many facets of security for computer systems and the network they are on. The client wanted the possible vulnerabilities and threats to their network and systems documented. If any are found, the job is to find solutions to mitigate and or remove those possible problems. Many security tools such as OpenVAS and…

Build System Monitoring Solution

An educational entity requested a solution that is capable of auditing their workstations. Their primary goal is to monitor logins to ensure that workstations are not being accessed after open hours. The ideal solution would also generate and send emails as alerts. Expanding on the original scope of the solution, LibreNMS was chosen for its…

Build Proxy Server

A transparent proxy server was created and implemented. The purpose of the transparent proxy is to reduce bandwidth and increase download speed. A virtual machine utilizing pfSense (a Linux based firewall) with a Squid transparent proxy add-on was created to provide easier manageability. Reports can be generated to show details regarding web traffic as well….

Virtual Lab Environments

This project provides university students access to virtual machines and environments for penetration testing, networking security, and forensics practice, as well as SQL databases. With a current total of five machines running virtualization software, our servers currently support 29 usable VMs. Our an application container server can accommodate an expanding number of SQL databases. It was…