Projects

Below are selected projects that showcase my technical skills across networking, system administration, database engineering, and digital forensics. These projects demonstrate my ability to design secure infrastructures, analyze complex data, manage enterprise networks, and build efficient, real‑world solutions.

Project 1 (Digital Forensics Investigation)

 

This project involved conducting a digital forensic investigation on a disk image associated with a simulated criminal case. The goal was to recover and analyze digital artifacts that could reveal communication records, financial information, and other evidence related to illegal activity.

My Role

I analyzed the disk image using forensic tools to locate emails, phone contacts, bank information, and deleted files connected to the suspects.

Tools Used

  • FTK Imager

  • Autopsy

  • ProDiscover

  • Hash Verification (MD5 / SHA1)

Key Findings

  • Email messages referencing suspicious shipments

  • Phone contact records connected to suspects

  • Bank account information

  • Recovered deleted files related to drug inventory

Project 2 (Windows Server 2022 Enterprise Configuration)

This project involved building a fully functional Windows Server 2022 domain environment designed to simulate a real enterprise network. I configured Active Directory, created organizational units, and added user accounts for multiple departments. I implemented Group Policy Objects (GPOs) to enforce strong password policies, account lockout rules, and security baselines across the domain. Additional server roles such as DNS, DHCP, IIS, and Routing and Remote Access (VPN) were configured to support network services and secure remote connectivity.

My Role

  • Configured a full Windows Server 2022 domain environment, including AD DS, DNS, DHCP, and IIS.

  • Created and managed user accounts, OUs, and security groups for multiple departments.

  • Implemented Group Policy Objects (GPOs) to enforce password policies, lockout rules, and security baselines.

  • Configured Password Settings Objects (PSOs) for role‑based password complexity and aging.

  • Set up SSL certificates and website bindings in IIS for secure web hosting.

  • Enabled and configured Routing and Remote Access (RRAS) to support VPN connectivity.

  • Performed domain replication checks, policy updates, and server hardening tasks.

Tools & Technologies Used

  • Windows Server 2022

  • Active Directory Domain Services (AD DS)

  • Group Policy Management

  • DNS / DHCP

  • IIS Web Server

  • RRAS (VPN)

  • VMware Workstation

Key Outcomes

  • Fully functioning enterprise domain with secure authentication and role‑based access.

  • Enforced strong password and account policies across all domain users.

  • Secure web server deployment with SSL certificate management.

  • Configured VPN access for remote administration and connectivity.

  • Demonstrated ability to deploy, secure, and manage enterprise‑level Windows infrastructure.

Project 3 (Flash Spook E‑Commerce Database System)

My Role

  • Designed and implemented a complete MySQL database for an e‑commerce platform.

  • Modeled all business entities including customers, orders, inventory, stores, promotions, and audit logs.

  • Implemented secure authentication, password validation, and AES encryption for payment tokens.

  • Developed stored procedures, triggers, and transactions to ensure ACID‑compliant order processing.

  • Performed indexing, query tuning, and table partitioning to improve performance.

  • Conducted concurrency testing to validate row‑locking and prevent overselling.

Tools & Technologies Used

  • MySQL 8.0

  • ER Diagramming & Relational Modeling

  • Stored Procedures & Triggers

  • AES Encryption

  • Indexing & Query Optimization

  • Transaction & Concurrency Control

  • JSON_TABLE, Composite Indexes, Functional Indexes

Key Findings / Results

  • Achieved a 98% performance improvement on slow queries through indexing and tuning.

  • Implemented secure role‑based access control for different user types.

  • Ensured data integrity with row‑level locking and transaction isolation levels.

  • Built a scalable schema capable of supporting high‑traffic seasonal retail operations.

  • Added auditing and failed‑login tracking for enhanced security and monitoring.