• Home
  • About
  • Project
  • Blog
  • Contact

Get in Touch

If you have any questions or need information, please feel free to contact me. Your feedback is highly valued, and I eagerly anticipate hearing from you.

Created by Robert Quintero

Say Hello🤚
Home
About
Project
Blog
Contact
Sitemap
RSS
  1. Home
  2. Project
  3. Implementing Enterprise Vulnerability Management with Rapid7 InsightVM

Implementing Enterprise Vulnerability Management with Rapid7 InsightVM

Cybersecurity
Networking
VMwareWindowsUbuntu

This project demonstrates the setup and configuration of Rapid7 InsightVM for enterprise vulnerability scanning. It covers platform deployment, asset discovery, scan configuration, and credential validation to enable effective vulnerability identification across systems and infrastructure.

1 month ago
1 min read
Robert Quintero
Visit Website
vulnerabilitymanagement
penetrationtesting
networksecurity
vulnerabilityassessment
selfhosted
securitysolutions
Implementing Enterprise Vulnerability Management with Rapid7 InsightVM
Implementing Enterprise Vulnerability Management with Rapid7 InsightVM

Hey there! I'm currently working on the project content, so please bear with me In the meantime, you can check out my other project posts


Related ProjectsView All
Practical Exploitation and Security Testing with Metasploit

Practical Exploitation and Security Testing with Metasploit

Cybersecurity
Networking
Kali-LinuxMetasploit

This project demonstrates the use of Metasploit to perform practical security testing in a controlled lab environment. It covers identifying vulnerable services, selecting appropriate exploit modules, and validating system weaknesses through controlled exploitation to understand potential security impacts.

1 month ago
1 min read
Setting Up VMware Workstation Pro 17 with Active Directory on Windows Server 2025

Setting Up VMware Workstation Pro 17 with Active Directory on Windows Server 2025

Networking
VMwareWindows

Set up Active Directory on Windows Server 2025 using VMware Workstation Pro 17 by installing the software, configuring the VM, installing Windows, adding AD and DNS roles, and setting a static IP.

2 years ago
4 mins read
Nmap Scans and Network Traffic Analysis for Cybersecurity

Nmap Scans and Network Traffic Analysis for Cybersecurity

Networking
Cybersecurity
NmapWireshark

This guide explores practical techniques for using Nmap to perform network scans, analyzing scan traffic with Wireshark, and leveraging Dumpcap for efficient data capture—ideal for cybersecurity professionals seeking actionable insights.

2 years ago
5 mins read
Setting Up Wazuh SIEM for Threat Detection in a Home Lab

Setting Up Wazuh SIEM for Threat Detection in a Home Lab

Cybersecurity
VMwareUbuntuWindowsdebian

I deployed a Wazuh SIEM environment on VMware Workstation using Ubuntu 24.04 Server, focusing on centralized log analysis, threat detection, and monitoring. By integrating both Linux and Windows systems, I explored features like file integrity monitoring, event log analysis, and real-time alerting to gain practical experience in cybersecurity operations.

2 years ago
4 mins read