About the Capstone Project
The final project gives you the chance to put your bootcamp knowledge and newly acquired skills to the test in a dynamic, hands-on environment. It’s an opportunity to create something real, showcase your technical abilities, and develop a project that will be a key part of your professional portfolio. It allows you to express your creativity and highlight how much you’ve evolved throughout your bootcamp experience.
Additionally, the final project is designed to replicate the challenges you will encounter in a real tech job, enabling you to showcase your skills in solving complex problems and equipping you for the expectations of your future career.
Red Team Project
The project focuses on red teaming techniques, particularly tailored for web application penetration testing, alongside performing vulnerability scans on Docker machines.
Key phases:
- Reconnaissance
- Initial Access
- Linux privilege escalation
- Exploiting identified vulnerabilities to gain root privileges
The primary objective is to simulate real-world attack scenarios to test the resilience of systems against potential threats. A detailed report will be produced, documenting the vulnerabilities identified, the exploitation methods used for initial access and privilege escalation, and providing strategic recommendations to secure the systems.
Blue Team Project
The Blueteam Project emphasizes blue team operations with a focus on Linux log analysis and the review of recovered audit files. Key areas covered include:
- Detecting Anomalies and Identifying Threats: Through meticulous log analysis to detect unusual activities that may indicate a breach.
- Forensic Investigations: Conducting in-depth examinations to determine how attackers gained access, the extent of the compromise, and identifying any files that were affected or stolen.
- Incident Analysis: Reviewing audit files to establish a detailed timeline of unauthorized activities and security breaches.
The aim of the project is to enhance system defenses by analyzing security events, responding effectively to potential breaches, and creating a detailed incident report. This report will cover the attack timeline, vulnerabilities exploited, and recommendations for future prevention.