Cybersecurity projects and tutorials

Let’s get you a security homelab!

Updated weekly with new projects and tutorials. I am attending school to earn a bachelor’s in cybersecurity and information assurance. I currently have certifications from CompTIA (A+, Network+, Security+) and hold the ITIL 4 Foundations certification.

certifications:
a+ png
network+ png
security+ png
certified in cybersecurity cc
A screenshot of the top command output in a Linux terminal, showing system processes and resource usage.
This image displays the real-time system process information and resource usage as shown by the top command on a Linux system.

Linux and Proxmox virtualization

I will place heavy emphasis on creating tutorials for Linux and Proxmox. I enjoy the ideals behind open source software and the access it allows, especially for home users.

“A program is free software if it gives users the four essential freedoms: to run, to study, to distribute, and to improve it.” – Richard Stallman, Founder of the Free Software Movement

Featured Articles

Follow me in my journey into IT and cybersecurity!

A screenshot from Proxmox VE of the install screen. Proxmox is a registered trademark of Proxmox Server Solutions GmbH.

The Ultimate Homelab: Building a Secure Gaming Cloud with Proxmox

My old gaming PC broke and was collecting dust. As a lifelong computer enthusiast, I decided to repurpose it with virtualization, turning it into a powerful, shared resource for my family and a way to reconnect with my passion for technology.

Home Security Tips

These are just a few quick tips for home users to protect themselves from the Internet’s craziness.

Use a password manager, start with something built into your browser and upgrade if you would like more features. Once you have a password manager create a strong password for the password manager and create unique passwords for every site you use.
Get a credit card with virtual cards and set them up for one-time use. I believe this is especially important for smaller websites where the security of the online transactions has not been thoroughly tested.
Never leave your password set as your network device’s default. Make sure you are using WPA2 with a long password at the very least, or if you are able (which is currently hard due to older devices), use WPA3 security on your wireless access point.
I recommend using a network ad-blocker. I use Unbound DNS with an OpnSense router, which is impossible for everyone. A small investment with a Raspberry PI or running a virtual machine for this purpose would be a budget-friendly alternative. I will be making a tutorial on this one in the future!
Detailed close-up of ethernet cables and network connections on a router, showcasing modern technology.
Close-up of a credit card payment being processed at a POS terminal.
Close-up view of a mouse cursor over digital security text on display.
Chain-locked book, phone, and laptop symbolizing digital and intellectual security.

Security Quotes

hacker, smartphone, fraud, personality, human, mask, danger, information, safety, antivirus, attack, organization, technology, design, attention, note, notebook, knavery, draw, deceive, misleading, fraud, fraud, fraud, fraud, fraud, antivirus, antivirus
“Amateurs hack systems; professionals hack people.”
– Bruce Schneier
Two surveillance cameras mounted on a concrete wall, highlighting security technology.
“The only truly secure system is one that is powered off, cast in a block of concrete, and sealed in a lead-lined room with armed guards—and even then, I have my doubts.”
– Gene Spafford
Vibrant multicolored source code displayed on a computer screen, depicting programming and web development concepts.
“We are drowning in information and starving for knowledge.”
– John Naisbitt