Practical AWS Cloud Security Posture Assessment Using Steampipe + Powerpipe
Assessing Cloud Security Using SQL Queries and Live Dashboards
Build and defend like real Security Engineers — from beginner SOC labs to advanced blue-team projects.
Assessing Cloud Security Using SQL Queries and Live Dashboards
This project will help you set up a local, agentless AWS security lab using SQL queries and interactive dashboards. You'll be able to query your AWS infrastructure using SQL and visualize security insights through a web-based dashboard—all running on your own machine.
You’ll learn Osquery fundamentals and understand how security teams use Osquery for endpoint visibility, investigation, and threat hunting.
Learn how network protocols actually behave on the wire by analyzing ARP, ICMP, TCP, UDP, DNS, HTTP, and TLS traffic using Wireshark—building the protocol understanding required before security investigations.
Learn how SOC and IT teams automate security workflows in real-world environments by understanding n8n fundamentals, triggers, webhooks, data handling, decision logic, alert enrichment, and notification workflows.
Learn how SOC analysts analyze logs in real-world environments by understanding log types, structures, searching techniques, pattern detection, and hands-on analysis using Splunk, Wazuh, and ELK Stack.
Master the essential packet analysis skills required for SOC Analysts, Network Engineers, and Security Professionals using real-world traffic captures and hands-on labs.
Identify real-world AWS attack surfaces through visual security posture analysis.
Build a safe cloud security lab to audit AWS misconfigurations using Scout Suite.
CIS-based AWS security audit identifying real misconfigurations and remediation guidance.
CIS-based AWS security audit identifying real misconfigurations and remediation guidance.
Learn how Threat Intelligence (TI) is used in real SOC environments to enrich alerts, identify attacker infrastructure, map threats to MITRE ATT&CK, and improve detection and response using open-source and community-driven intelligence platforms.
Learn how SOAR platforms automate SOC operations by orchestrating tools, enriching alerts, and executing response actions—through hands-on walkthroughs of n8n, Shuffle, and Tines.
Learn how SIEM platforms work in real SOC environments by understanding log ingestion, normalization, searching, correlation, and alerting—followed by hands-on walkthroughs of Splunk, Wazuh SIEM, and ELK Stack.
Learn how EDR works in real SOC environments by understanding endpoint telemetry, detection logic, and response workflows—followed by hands-on walkthroughs of popular open-source EDR tools.
Develop real-world SOC Analyst Level-1 skills by learning how to triage security alerts, validate threats using context, collect evidence, classify severity, and write professional incident reports used in enterprise SOC environments.
Understand how a real-world Security Operations Center (SOC) operates by learning its purpose, people, tools, processes, data flow, alerts, and business impact through structured, concept-driven tasks.
Build a strong foundation in cybersecurity by understanding threats, attacks, defenses, identity protection, and cryptography through practical, beginner-friendly exercises.
Build strong networking foundations by understanding how data moves across networks, how devices communicate, and how enterprises design, monitor, and secure networks.
Master the core concepts of Windows Active Directory (AD) by building, managing, and analyzing a real AD environment the way it’s used in enterprise networks.
Master the core Windows skills required for SOC Analysts, Security Engineers, IT Administrators, and Cloud Professionals through fully hands-on, task-based labs.
Build a near real-time event-driven pipeline to stream GuardDuty security findings through EventBridge, SNS, and SQS into Splunk for immediate threat detection and incident response.
Build a secure pipeline to export GuardDuty security findings to an encrypted S3 bucket and automatically ingest them into Splunk for centralized threat monitoring and analysis.
Investigate network traffic on a target Ubuntu machine using Suricata (IDS) and ELK SIEM with Fleet (Elastic Agent), visualize suspicious network traffic patterns, and create alerts for abnormal or potentially malicious activities such as intrusion attempts, DDoS attacks, or malware communication.
Investigate file integrity and detect unauthorized changes on a target Ubuntu machine using Auditd and ELK SIEM with Fleet (Elastic Agent). This guide will walk you through setting up Auditd to monitor file integrity, sending logs to Elasticsearch via Fleet, visualizing file changes in Kibana, and setting up alerts for suspicious activities like unauthorized file modifications.
Detect and investigate suspicious system changes (such as potential rootkits or malware) on a target Ubuntu machine using ELK SIEM with Fleet (Elastic Agent), Sysmon for Linux, and the Sysmon for Linux Connector, visualize these changes in real-time, and create alerts for abnormal system behaviors.
Investigate unauthorized SSH access attempts on a target Linux machine using ELK SIEM
Use Sysmon for Linux to monitor and detect unauthorized user account activities, such as privilege escalations, account creations, deletions, or suspicious commands. Leverage Sysmon’s detailed logging capabilities to track and analyze user activity efficiently.
Set up a network monitoring system to detect abnormal traffic patterns, including data exfiltration and command-and-control (C2) communication, by leveraging Suricata with Emerging Threats (ET) rules and analyzing logs using Splunk.
Monitor and detect unauthorized modifications, deletions, or attribute changes in sensitive directories, such as /etc/, using Auditd for real-time monitoring and Splunk for centralized log analysis.
Detect and investigate suspicious processes running on an Ubuntu server using practical tools like Sysmon for Linux and Splunk. Simulate an attack by running a reverse shell.
Real-Time Detection and Automated Response Workflow for Unauthorized Access Attempts on Linux Using Fail2Ban
Building a Secure & Serverless CloudWatch-to-Splunk Pipeline Using AWS Native Services
Master the core Linux skills required for SOC Analysts, Security Engineers, and Cloud Professionals through fully hands-on labs.
Build a reliable CloudTrail ingestion pipeline for Splunk with AWS services like S3, SNS and SQS. Understand each component and how Splunk processes logs end-to-end.
Build a centralized security monitoring environment by sending pfSense firewall logs to Wazuh for real-time threat detection and analysis. In this hands-on project, you will configure pfSense to forward logs to a Wazuh Manager, where they will be parsed, indexed, and visualized through the Wazuh Dashboard.
Build a complete centralized security log management system by ingesting Check Point Firewall logs into Graylog using Syslog and Docker. Learn how to collect, store, parse, and analyze enterprise-grade firewall telemetry inside Graylog for threat detection and monitoring.
Build a complete centralized log management system using Graylog on Docker to collect, store, and analyze logs from an Ubuntu syslog client.
Monitor and Analyze Cloudflare Web Traffic, WAF Actions, and Server Performance in Real-Time
Building a Real-Time Detection and Automated Response Workflow for SSH Brute-Force Attacks in Splunk SIEM
Detect unauthorized or suspicious file modifications in critical directories using Wazuh’s FIM (File Integrity Monitoring) module and automatically isolate or remediate affected endpoints
Detect unauthorized or suspicious file modifications in critical directories using Wazuh’s FIM (File Integrity Monitoring) module and automatically isolate or remediate affected endpoints through Active Response.
Monitor, analyze, and respond to Docker container events using Wazuh SIEM for real-time security visibility.
Building a Real-Time Web Activity Monitoring Dashboard
Building a Real-Time SSH Authentication Monitoring Dashboard
An End-to-End Solution for Third-Party Vendor Risk Assessment (VRA) that Drastically Reduces Vetting Time to Minutes by Automating Domain Reputation Checks, Real-Time Security Incident Monitoring, and Deep Risk Synthesis using Generative AI (DeepSeek) and the n8n Workflow Platform.
Build a SOAR-enabled SIEM lab with Splunk Phantom, Splunk Enterprise, Wazuh sensors/agents, DMZ hosts, integrations (VirusTotal, Slack, ServiceNow, Outlook) and AWS GuardDuty alerting into Phantom.
Build an Open-Source SOAR Lab integrating Shuffle with Wazuh, Suricata IDS, Splunk Enterprise, and AWS GuardDuty, including integrations with VirusTotal, Slack, ServiceNow, Outlook, and OTX for automated detection, enrichment, and response.
Build and Configure a Complete Threat-Detection Environment using Splunk, Suricata IDS, and Attacker Simulations
Build and Configure an End-to-End SIEM Stack using Elastic, Suricata, and Fleet
Build and Configure a Complete Security Information and Event Management (SIEM) System with Wazuh
Real-time detection of failed logins, query errors, and slow queries in MySQL
Search, collect, and analyze .onion URLs on Linux Server for threat intelligence
Understanding Endpoint Security, Threat Detection, Vulnerability Management, and Automated Response in Enterprise Environments
Understanding Volatile Data, RAM Analysis, and Forensic Tools
Real-time detection of HTTP errors, brute-force and suspicious requests from Apache logs
Integrating and Monitoring Suricata Network Events (eve.json, DNS, TLS, SSH) Using Wazuh SIEM
Learn how to gather essential system, user, and network information from Windows using PowerShell for DFIR readiness.
Real-Time Windows Event and Sysmon Log Analysis Using Wazuh SIEM
Explore how Dark Web search engines and marketplaces surface hidden content, learn safe OSINT
Understand Internet Layers, Anonymous Communication, and Dark Web Monitoring Basics
Deploy, Configure, and Hunt Threats with Velociraptor Forensics Platform
A Practical Guide to Vulnerability Management, Scanning, and Remediation with Qualys VM
Build an automated workflow to audit Palo Alto firewall rules, enrich them with real-time usage data, and generate insightful security reports using n8n and AI.
A guide to integrating Splunk with n8n for alert enrichment.
Automated Malicious URL Detection and Response with Suricata, Splunk, and n8n.
Set Up and Run Your Own Local n8n Instance for Workflow Automation.
Automate IP Address Threat Intelligence and Incident Response using Splunk and n8n.
Automate malware analysis by sending Wazuh-detected suspicious files into ANY.RUN, retrieving detailed reports and IOCs, and integrating results back into your SOC workflow.
Automated DNS threat detection and enrichment workflow integrated with VirusTotal, Wazuh, and n8n.
Enrich Wazuh file-integrity alerts with VirusTotal file-hash lookups, generate a human-friendly report, and escalate suspicious files to ServiceNow + Slack.
Enrich Wazuh alerts with IP reputation (VirusTotal + AlienVault) and route suspicious IPs to ServiceNow / Slack / Email via n8n.
Detecting Brute Force, SQL Injection, XSS, and Suspicious Web Activity from Apache Access Logs with Splunk SIEM
Practical triage of Linux file systems for anomalies, metadata, and hidden files
End-to-end detection of scans, brute-force, and noisy DNS from endpoint/network logs
Using Suricata IDS alerts inside Wazuh to detect malicious traffic
Detecting Unauthorized File Changes with Wazuh SIEM
Collecting and Forwarding Logs from Windows to Splunk Indexer
Collecting and Forwarding Logs from Ubuntu to Splunk Indexer
Threat Detection and Analysis with Amazon GuardDuty Logs
Detecting WAF Blocks, Brute Force, SQLi, XSS, LFI, and Recon from Cloudflare HTTP Logs (JSON/JSONL)
Analyse DNS query logs in Splunk to detect anomalies, query patterns, and suspicious activity.
A Hands-On Lab to Detect Client Errors, Suspicious User Agents, and Malicious URIs Using Splunk SIEM
A Hands-On Lab to Detect Brute Force Attacks, Failed Logins, and Suspicious SSH Activity Using Splunk SIEM
Deploy and configure Wazuh SIEM on Ubuntu to monitor, detect, and respond to security events in real-time.
Set up Splunk Enterprise on Ubuntu to start collecting, indexing, and analyzing machine data in minutes
Build, Configure, and Master Intrusion Detection with Suricata in Your Own Lab
Build, Configure, and Master Intrusion Detection with Snort in Your Own Lab
Build, Configure, and Master Intrusion Detection with Snort in Your Own Lab