ssh root@cybersystems
Password: *********
Last login: Mon Jul 10 14:23:45 2023 from 192.168.1.100
root@cybersystems:~# _
SKILLS & PROJECTS PRESENTATION
CYBER SYSTEMS | VIRTUALIZATION | NETWORK SECURITY
[Steven Chapotot] | ASRBD Certified
WINDOWS SERVER EXPERTISE
Windows Server 2012 → 2022
Full lifecycle management from deployment to decommissioning
Network Services
DHCP, DNS, File Services, Print Services configuration and optimization
Active Directory
User/Group management, GPO implementation, Domain Services
Patch Management
WSUS deployment, security updates, vulnerability mitigation
PS C:\> Get-ADUser -Filter * -Properties LastLogonDate | Sort LastLogonDate
Name Enabled LastLogonDate
---- ------- -------------
Administrator True 7/10/2023 2:30:15 PM
jdoe True 7/9/2023 11:45:22 AM
svc_backup True 7/8/2023 3:15:00 AM
PS C:\> _
LINUX & SCRIPTING POWER
Ubuntu/Debian Admin
LTS deployments, package management, service configuration
Kali Linux
Penetration testing, security auditing, vulnerability assessment
Advanced Bash
Automation scripts, cron jobs, system monitoring
#!/bin/bash
# Automated backup script
BACKUP_DIR="/backups/$(date +%Y-%m-%d)"
mkdir -p $BACKUP_DIR
echo "Starting backup process..."
mysqldump -u root -p$DB_PASS --all-databases > $BACKUP_DIR/full.sql
tar -czf $BACKUP_DIR/webroot.tar.gz /var/www/html
# Sync to remote storage
rsync -avz $BACKUP_DIR backup-server:/storage/
echo "Backup completed successfully"
root@linux-server:~# _
CORE NETWORK SKILLS
VPN Tunneling
Pfsense, OpenVPN, IPSec site-to-site and remote access solutions
Firewall Rules
Stateful inspection, NAT, traffic shaping, security policies
DNS & DHCP
Forward/reverse zones, dynamic updates, scope management
Network Diagnostics
nmap, traceroute, tcpdump, Wireshark, netstat analysis
root@firewall:~# pfctl -sr
@0 block drop in log all
@1 pass in quick on em0 inet proto tcp from any to 192.168.1.50 port = 443 flags S/SA keep state
@2 pass in quick on em0 inet proto udp from 10.0.0.0/24 to any port = 500 keep state
@3 pass out quick on em1 inet all flags S/SA keep state
root@firewall:~# _
TOOLS OF THE TRADE
Pfsense/OPNSense
Enterprise firewall and routing platform
GLPI
IT asset and helpdesk management
Greenbone
Vulnerability scanning and management
GitLab CI/CD
Automated build and deployment pipelines
root@scanner:~# gvm-cli --gmp-username admin --gmp-password $PASS socket --xml "<get_tasks/>"
<get_tasks_response status="200" status_text="OK">
<task id="daba56c8-73ec-11df-a475-002264764cea">
<name>Full Network Scan</name>
<comment>Weekly vulnerability assessment</comment>
<status>Done</status>
</task>
</get_tasks_response>
root@scanner:~# _
PROJECT 1 – SEAHAWKS MONITORING
Virtualized Infrastructure
VMware ESXi cluster with HA configuration and resource pooling
vMotion enabled
DRS automated balancing
Security & Monitoring
Comprehensive monitoring stack with alerting system
Grafana
Zabbix
Prometheus
ELK
root@monitoring:~# systemctl status seahawks.service
● seahawks.service - Seahawks Monitoring System
Loaded: loaded (/lib/systemd/system/seahawks.service; enabled; vendor preset: enabled)
Active: active (running) since Mon 2023-07-10 14:30:45 UTC; 1h 25min ago
Main PID: 1429 (seahawks)
Tasks: 15 (limit: 4915)
Memory: 142.7M
CGroup: /system.slice/seahawks.service
├─1429 /usr/bin/seahawks --config /etc/seahawks/config.yml
└─1452 /usr/bin/seahawks --worker
root@monitoring:~# _
SEAHAWKS MONITORING
KEY ACHIEVEMENTS
24/7 High Availability
99.99% uptime achieved through clustered architecture
Remote Access Management
Secure web interface with RBAC for distributed teams
Live Alerts & Supervision
Real-time notifications via Email/SMS/Webhook
Zero Downtime Deployment
Blue-green deployment strategy for seamless updates
root@monitoring:~# uptime
14:45:30 up 62 days, 3:15, 2 users, load average: 0.12, 0.08, 0.06
root@monitoring:~# curl -s http://localhost:9090/api/health | jq .
{
"status": "healthy",
"services": {
"database": "connected",
"alert_manager": "active",
"storage": "92% free"
}
}
root@monitoring:~# _
PROJECT 2 – NESTER MANAGER DATABASE
Relational DB Architecture
MySQL database with optimized schema design
- Normalized tables
- Proper indexing
- Stored procedures
- Foreign key constraints
Operations & Security
Enterprise-grade database management
- Automated encrypted backups
- Point-in-time recovery
- Role-based access control
- Performance tuning
mysql> SHOW CREATE TABLE users;
CREATE TABLE `users` (
`id` int(11) NOT NULL AUTO_INCREMENT,
`username` varchar(50) NOT NULL,
`email` varchar(100) NOT NULL,
`password_hash` varchar(255) NOT NULL,
`created_at` timestamp NOT NULL DEFAULT CURRENT_TIMESTAMP,
`updated_at` timestamp NOT NULL DEFAULT CURRENT_TIMESTAMP ON UPDATE CURRENT_TIMESTAMP,
PRIMARY KEY (`id`),
UNIQUE KEY `username` (`username`),
UNIQUE KEY `email` (`email`)
) ENGINE=InnoDB DEFAULT CHARSET=utf8mb4 COLLATE=utf8mb4_unicode_ci
mysql> _
DATABASE OPERATIONS MASTERY
Backup Strategies
Full, incremental, and differential backups with cron automation
Performance Metrics
Query optimization, index analysis, slow query logging
Access Control
Granular permissions with GRANT/REVOKE, role-based security
Replication
Master-slave configuration for read scalability and failover
root@db-master:~# mysqldump --single-transaction --routines --triggers --all-databases | gzip > /backups/full_$(date +%F).sql.gz
root@db-master:~# mysql -e "SHOW SLAVE STATUS\G"
*************************** 1. row ***************************
Slave_IO_State: Waiting for master to send event
Master_Host: 192.168.1.100
Master_User: repl_user
Master_Port: 3306
Connect_Retry: 60
Master_Log_File: mysql-bin.000042
Read_Master_Log_Pos: 107
root@db-master:~# _
INFRASTRUCTURE STACK OVERVIEW
root@monitoring:~# kubectl get pods -A
NAMESPACE NAME READY STATUS RESTARTS AGE
kube-system coredns-74ff55c5b-8k2hv 1/1 Running 0 5d
kube-system etcd-k8s-master 1/1 Running 0 5d
kube-system kube-apiserver-k8s-master 1/1 Running 0 5d
monitoring grafana-7d8b4bc4b4-5j6wq 1/1 Running 0 2d
monitoring prometheus-server-6f6b98b8f7-9k2vx 1/1 Running 0 2d
root@monitoring:~# _
CYBERSECURITY AT CORE
Firewall Hardening
Default deny policies, egress filtering, IDS/IPS integration
VPN Encryption
AES-256, perfect forward secrecy, certificate-based auth
Log Management
Centralized syslog, SIEM integration, retention policies
Anomaly Detection
Behavioral analysis, threshold alerts, automated responses
root@firewall:~> pfctl -t bruteforce -T show
91.121.143.62 143.244.38.29 185.156.73.42
45.155.205.213 198.244.213.78 103.255.61.94
root@firewall:~> grep "Failed password" /var/log/auth.log | awk '{print $11}' | sort | uniq -c | sort -nr | head
142 203.113.167.14
89 45.155.205.213
62 185.156.73.42
38 91.121.143.62
root@firewall:~> _
READY FOR TOMORROW'S CHALLENGES
Secure Networks
Implementing defense-in-depth strategies for modern threats
High-Availability
Designing resilient systems with minimal downtime
Data Integrity
Ensuring confidentiality, availability and reliability
Cloud Integration
Hybrid infrastructure with seamless interoperability
root@future:~# systemctl status all_services
● all_services.service - All Critical Systems
Loaded: loaded (/etc/systemd/system/all_services.service; enabled; vendor preset: enabled)
Active: active (running) since Mon 2023-07-10 15:00:00 UTC; 1h ago
Main PID: 1 (systemd)
Tasks: 145 (limit: 4915)
Memory: 12.3G
CGroup: /system.slice/all_services.service
├─network.service: healthy
├─security.service: active
└─monitoring.service: nominal
root@future:~# _
Thank you for your time and consideration
[Your Name] | [Contact Information]