IT/Cyber Home Lab

Project URL: https://nathandowd.tech/projects/it-cyber-home-lab/

I have created a home lab from networking equipment my previous employer was throwing away. I have created a mock small business network rack, A domain controller with users and groups. Administrators, Helpdesk and employees with access and permissions that adhere to principle of least privilege. A small network that's starts from my ISP's modem/router, I have it in bridge mode connecting to my Microtik router. My Mikrotik was set using unconventional ports for basic services like HTTP/HTTPS, FTP. It’s connected to a 5 port Unifi managed switch, I have my access points connected to it. I have 2 Vlans on that switch, the second Vlan is connected to a cisco router. I have turned my Mac pro into a VM workstation where I host most of them using Virtual Box. I have one in VM workstation. I have a vulnerable Vm that sits behind a PFsense firewall with no internet access to keep my hacking and practice secured.   Network MikroTik Router Changed Admin Password Changed Default Ports Disabled unused services 5 Port managed switch Created Vlans 2 UAP’s(Broadcast open wifi to watch free network traffic, block certain activities, content filter, tried some wifi attacks) Cisco Switch (Vlans, Port Security) Cisco Router VM Workstation Virtual Box Windows DC (Win 10) AD Win 10 Helpdesk (Splunk(CCU)Nessus, Cisco Packet Tracer(CCNA) Win 10 User Ubuntu  (LPI Linux Essentials training) CentOS (LPI Linux Essentials training) Kali Linux (NMAP, John The Ripper, Metasploit) Vulnerable Machine (Vuln Scan, patch and fix) Vmware Workstation ADHD-BHIS VM Fortigate Firewall (content filtering windows user)