M. Jahin

Projects

ICS/OT Cybersecurity
ICS/OT Cybersecurity
Project

Aqua Sentinel - ICS Cybersecurity Capstone Project

ICS/OT Cybersecurity
Project

Aqua Sentinel - ICS Cybersecurity Capstone Technical Report

In recent years, cyber threats have grown remarkably and become one of the most significant threats to modern businesses
ICS/OT Cybersecurity
Project

CEH Penetration Test Report - MD Muhtashim Jahin

This report details the findings of a penetration testing engagement conducted on specific network assets within the campus environment. The primary objectives of this assessment were to Identify Vulnerabilities, Enumerate Open Ports, perform Operating System (OS) detection, and, critically, to Attempt to Gain Unauthorized Access to the designated target systems through the exploitation of identified vulnerabilities.
Security Operations/Blue Team Projects
Project

Advanced Cybersecurity SOC Lab – Threat Detection, Monitoring, Incident Response & Vulnerability Management

This project simulates a fully functional enterprise-grade Security Operations Center (SOC) environment using FortiGate Rugged 60d, Palo Alto NGFW and Cisco CSR hardware and integrated cybersecurity platforms (FortiSIEM, Suricata, Tenable Nessus).
Project

IDS/IPS Setup: SURICATA

An Intrusion Detection System (IDS) is a cybersecurity solution designed to monitor network traffic and devices for anomalies, malicious activities, and policy violations (e.g.: Port scanning or Nmap Scans).

An IDS can be implemented as software on a device, dedicated hardware, or a cloud-based solution. An IDS operates in passive mode.
Network Security Engineering & Network Engineering
Information Technology
Project

IT Infrastructure Deployment, System Administration & Monitoring

This project involved the end-to-end deployment of an enterprise IT infrastructure designed for centralized management, security, and monitoring.
Network Architecture Project.
Project

Blue Sky Mining Corporation: Remote Site Coalmine Network Architecture

In an elastic cyber-construct that happens 10 years from now; I am part of an engineering design team for a green field copper, zinc and lead mine.
Network Security Engineering
Project

Enterpirse Corporate Network Security Architecture and Configuration for Property Management Firm

Enterprise Multi-Site Network Architecture and Configuration for Proper Management Firm
Penetration Test/Red Team
Project

Web Application Penetration Testing Report (DVWA)

This Project involved conducting a targeted web application penetration test on the Damn Vulnerable Web Application (DVWA), configured at Medium Security Level. The goal was to exploit common vulnerabilities and demonstrate their impact while applying ethical hacking methodologies.
Project

CEH Penetration Test Report - Md Muhtashim Jahin

This report details the findings of a penetration testing engagement conducted on specific network assets within the campus environment. The primary objectives of this assessment were to Identify Vulnerabilities, Enumerate Open Ports, perform Operating System (OS) detection, and, critically, to Attempt to Gain Unauthorized Access to the designated target systems through the exploitation of identified vulnerabilities.
ICS/OT Cybersecurity
ICS/OT Cybersecurity
Project

Aqua Sentinel - BCIT INCS Culminating Project

ICS/OT Cybersecurity
Project

INCS-Culminating

In recent years, cyber threats have grown remarkably and become one of the most significant threats to modern businesses
ICS/OT Cybersecurity
Project

CEH Penetration Test Report - MD Muhtashim Jahin

This report details the findings of a penetration testing engagement conducted on specific network assets within the campus environment. The primary objectives of this assessment were to Identify Vulnerabilities, Enumerate Open Ports, perform Operating System (OS) detection, and, critically, to Attempt to Gain Unauthorized Access to the designated target systems through the exploitation of identified vulnerabilities.
Network Security & Engineering
Information Technology
Project

IT Infrastructure Deployment, System Administration & Monitoring

This project involved the end-to-end deployment of an enterprise IT infrastructure designed for centralized management, security, and monitoring.
IT & OT Converged Network Architecture Project.
Project

Blue Sky Mining Corporation: Remote Site Coalmine Network Architecture

In an elastic cyber-construct that happens 10 years from now; you are part of an engineering design team for a green field copper, zinc and lead mine.
Network Security Engineering & Configuration
Project

Enterpirse Corporate Network Security Architecture and Configuration for Property Management Firm

Enterprise Multi-Site Network Architecture and Configuration for Proper Management Firm
Security Operations/Blue Team Projects
Project

Advanced Cybersecurity SOC Lab – Threat Detection, Monitoring, Incident Response & Vulnerability Management

This project simulates a fully functional enterprise-grade Security Operations Center (SOC) environment using Fortinet, Cisco & Palo Alto hardware and integrated cybersecurity platforms (FortiSIEM, Suricata, Tenable Nessus).
Project

SURICATA

An Intrusion Detection System (IDS) is a cybersecurity solution designed to monitor network traffic and devices for anomalies, malicious activities, and policy violations (e.g.: Port scanning or Nmap Scans).

An IDS can be implemented as software on a device, dedicated hardware, or a cloud-based solution. An IDS operates in passive mode.
ICS/OT Cybersecurity
Project

Aqua Sentinel - BCIT INCS Culminating Project

Project

INCS-Culminating

In recent years, cyber threats have grown remarkably and become one of the most significant threats to modern businesses
Project

CEH Penetration Test Report - MD Muhtashim Jahin

This report details the findings of a penetration testing engagement conducted on specific network assets within the campus environment. The primary objectives of this assessment were to Identify Vulnerabilities, Enumerate Open Ports, perform Operating System (OS) detection, and, critically, to Attempt to Gain Unauthorized Access to the designated target systems through the exploitation of identified vulnerabilities.
Security Operations/Blue Team Projects
Project

Advanced Cybersecurity SOC Lab – Threat Detection, Monitoring, Incident Response & Vulnerability Management

This project simulates a fully functional enterprise-grade Security Operations Center (SOC) environment using Fortinet, Cisco & Palo Alto hardware and integrated cybersecurity platforms (FortiSIEM, Suricata, Tenable Nessus).
Project

SURICATA

An Intrusion Detection System (IDS) is a cybersecurity solution designed to monitor network traffic and devices for anomalies, malicious activities, and policy violations (e.g.: Port scanning or Nmap Scans).

An IDS can be implemented as software on a device, dedicated hardware, or a cloud-based solution. An IDS operates in passive mode.
Network Security Engineering & Network Engineering
Information Technology
Project

IT Infrastructure Deployment, System Administration & Monitoring

This project involved the end-to-end deployment of an enterprise IT infrastructure designed for centralized management, security, and monitoring.
Network Architecture Project.
Project

Blue Sky Mining Corporation (Remote Site Coalmine Network Architecture)

In an elastic cyber-construct that happens 10 years from now; you are part of an engineering design team for a green field copper, zinc and lead mine.
Network Security Engineering
Project

Enterpirse Corporate Network Security Architecture and Configuration for Property Management Firm

Enterprise Multi-Site Network Architecture and Configuration for Proper Management Firm
Penetration Test/Red Team
Project

Web Application Penetration Testing Report (DVWA)

This Project involved conducting a targeted web application penetration test on the Damn Vulnerable Web Application (DVWA), configured at Medium Security Level. The goal was to exploit common vulnerabilities and demonstrate their impact while applying ethical hacking methodologies.
Project

CEH Penetration Test Report - Md Muhtashim Jahin

This report details the findings of a penetration testing engagement conducted on specific network assets within the campus environment. The primary objectives of this assessment were to Identify Vulnerabilities, Enumerate Open Ports, perform Operating System (OS) detection, and, critically, to Attempt to Gain Unauthorized Access to the designated target systems through the exploitation of identified vulnerabilities.
Server

Pi-hole DNS Server on Raspberry Pi 5

Ad-free browsing, network-wide. This project sets up a Pi-hole DNS server on a Raspberry Pi 5 to block ads and trackers at the network level. With a static IP configuration and privacy-focused DNS resolution, it ensures cleaner traffic and enhanced security across all connected devices.
IT

Information Technology (IT)

Seamless operations, technology-driven. IT solutions support data systems, network management, and enterprise software to streamline workflows, enhance productivity, and enable secure, scalable digital transformation.
Security

Cybersecurity & Network Security

Enterprise-grade defense, system-wide. Cybersecurity and network security frameworks ensure threat detection, secure communication, and infrastructure resilience—protecting data, devices, and operations across digital environments.
IOT

Internet of Things (IOT)

Connected intelligence, device-wide. IoT solutions integrate sensors, networks, and platforms to enable real-time monitoring, smart automation, and data-driven insights—optimizing efficiency, safety, and control across environments.
OT

Operational Technology (OT)

Industrial control, system-secured. OT solutions manage and monitor physical processes through integrated hardware and software—ensuring real-time performance, safety, and resilience in critical infrastructure environments.