01 · Online Bookstore UI
Implemented · Responsive layout · JS demo
Interactive UI with cards, hover/tilt and a simple cart simulation (localStorage).
ASIXC portfolio
Project 1 and 2 are implemented. The rest are ASIXC-related concepts with short descriptions.
Implemented · Responsive layout · JS demo
Interactive UI with cards, hover/tilt and a simple cart simulation (localStorage).
Implemented · UI states · Theme-ready
Weather card interface prepared for API integration, with clean typography and layout.
Concept · Security baseline
SSH, firewall, users/groups, sudo policy, auditd, updates and logging checklist.
Concept · Active Directory
Domain setup, OU structure, GPO rules, password policies and least privilege.
Concept · Networking
Small campus lab design using VLANs, trunking, inter-VLAN routing and ACLs.
Concept · Firewall
WAN/LAN rules, NAT, port forwards, logging strategy and test scenarios.
Concept · Remote access
Secure remote access design: peers, keys, routing, DNS and hardening notes.
Concept · Availability
Backup types, schedule, retention, offsite copy and recovery verification plan.
Concept · Monitoring
Central view for alerts, suspicious logins, blocked connections and daily summary.
Concept · Process
Steps for triage, containment, eradication and lessons learned for common incidents.
Concept · Assessment
Nmap + Nessus/OpenVAS scan workflow, findings severity and remediation tracking.
Concept · SIEM basics
Collect system logs, parse fields, search patterns and create simple dashboards.
Concept · Containers
Least privilege, image scanning, secrets handling, and safe runtime configuration.
Concept · Access control
Namespaces, roles, rolebindings and service accounts with minimal permissions.
Concept · Web security
TLS configuration, headers, rate limiting, logging and basic WAF strategy.
Concept · Detection
Rules, alerts, test traffic and tuning to reduce false positives.
Concept · Secure administration
Jump host architecture, key management, MFA idea and audit logging approach.
Concept · Compliance
Policy review checklist, weak password detection and improvement recommendations.
Concept · Observability
Host discovery, metrics, alerts and simple SLA dashboard for a lab network.
Concept · Digital forensics
Evidence handling steps: imaging, hashing, chain of custody and reporting outline.