Forem

Samuel Adeduntan  profile picture

Samuel Adeduntan

Detail-oriented junior security specialist with 2+ years of experience in security analytics, incident response, and threat detection. Proficient in SIEM platforms (Splunk), vulnerability assessment

Education

M.A. Cybersecurity (DePaul), M.Sc. Software Dev (Quantic), B.A. Sociology & Religion

Pronouns

he, his, him

Work

SOC Analyst | Projects: Wazuh SIEM, Pentesting, Endpoint & Email Security, Network Monitoring

Network Monitoring with PRTG
Cover image for Network Monitoring with PRTG

Network Monitoring with PRTG

Comments
10 min read

Want to connect with Samuel Adeduntan ?

Create an account to connect with Samuel Adeduntan . You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
#DAY 8: Monitoring, Logs & Troubleshooting
Cover image for #DAY 8: Monitoring, Logs & Troubleshooting

#DAY 8: Monitoring, Logs & Troubleshooting

Comments
3 min read
#DAY 7: Users & Authentication
Cover image for #DAY 7: Users & Authentication

#DAY 7: Users & Authentication

1
Comments
2 min read
#DAY 6: Security Profiles: Web Filtering & Application Control
Cover image for #DAY 6: Security Profiles: Web Filtering & Application Control

#DAY 6: Security Profiles: Web Filtering & Application Control

1
Comments
4 min read
#DAY 5: Firewall Policies, NAT & Logging
Cover image for #DAY 5: Firewall Policies, NAT & Logging

#DAY 5: Firewall Policies, NAT & Logging

Comments
4 min read
#DAY 4: Interfaces & Internal Network Setup
Cover image for #DAY 4: Interfaces & Internal Network Setup

#DAY 4: Interfaces & Internal Network Setup

2
Comments
4 min read
#DAY 3: Accessing GUI, Licensing, and Patching
Cover image for #DAY 3: Accessing GUI, Licensing, and Patching

#DAY 3: Accessing GUI, Licensing, and Patching

Comments
2 min read
#DAY 2: Basic FortiGate Configuration
Cover image for #DAY 2: Basic FortiGate Configuration

#DAY 2: Basic FortiGate Configuration

Comments
3 min read
#DAY 1: Gathering assets on FortiGate Firewall Deployment and Configuration journey
Cover image for #DAY 1: Gathering assets on FortiGate Firewall Deployment and Configuration journey

#DAY 1: Gathering assets on FortiGate Firewall Deployment and Configuration journey

1
Comments
3 min read
#Pre-Day 1: Preparation
Cover image for #Pre-Day 1: Preparation

#Pre-Day 1: Preparation

Comments
2 min read
My Hands-On Experience with Network Monitoring Using PRTG
Cover image for My Hands-On Experience with Network Monitoring Using PRTG

My Hands-On Experience with Network Monitoring Using PRTG

1
Comments
6 min read
#DAY 12: My Project Summary & Learning Journey.
Cover image for #DAY 12: My Project Summary & Learning Journey.

#DAY 12: My Project Summary & Learning Journey.

2
Comments
5 min read
#DAY 11: High Availability – Deploying a Reverse Proxy (Nginx)
Cover image for #DAY 11: High Availability – Deploying a Reverse Proxy (Nginx)

#DAY 11: High Availability – Deploying a Reverse Proxy (Nginx)

1
Comments
3 min read
#DAY 10:Adding an API JSON Query Monitor in Uptime Kuma
Cover image for #DAY 10:Adding an API JSON Query Monitor in Uptime Kuma

#DAY 10:Adding an API JSON Query Monitor in Uptime Kuma

1
Comments
2 min read
#DAY 8 & 9: Cross-Platform Monitoring - Adding a Windows Host
Cover image for #DAY 8 & 9: Cross-Platform Monitoring - Adding a Windows Host

#DAY 8 & 9: Cross-Platform Monitoring - Adding a Windows Host

Comments
8 min read
#DAY 7: The First Fire Drill: Incident Simulation
Cover image for #DAY 7: The First Fire Drill: Incident Simulation

#DAY 7: The First Fire Drill: Incident Simulation

Comments
3 min read
#DAY 6 - Organization & Public Status Page
Cover image for #DAY 6 - Organization & Public Status Page

#DAY 6 - Organization & Public Status Page

Comments
3 min read
#DAY 5 - Getting Proactive: Telegram Alert Configuration
Cover image for #DAY 5 - Getting Proactive: Telegram Alert Configuration

#DAY 5 - Getting Proactive: Telegram Alert Configuration

1
Comments
3 min read
#DAY 4 - Expanding My Monitoring Scope: External & Advanced Checks
Cover image for #DAY 4 - Expanding My Monitoring Scope: External & Advanced Checks

#DAY 4 - Expanding My Monitoring Scope: External & Advanced Checks

1
Comments
5 min read
#DAY 3 - Monitoring Internal Services: FTP & SSH
Cover image for #DAY 3 - Monitoring Internal Services: FTP & SSH

#DAY 3 - Monitoring Internal Services: FTP & SSH

1
Comments
3 min read
#DAY 2: Deploying the Monitoring Dashboard - Uptime Kuma
Cover image for #DAY 2: Deploying the Monitoring Dashboard - Uptime Kuma

#DAY 2: Deploying the Monitoring Dashboard - Uptime Kuma

1
Comments
2 min read
#DAY 1: Docker & Core Concepts
Cover image for #DAY 1: Docker & Core Concepts

#DAY 1: Docker & Core Concepts

2
Comments
2 min read
#Pre-DAY 1: Laying the Foundation: Docker & Concepts
Cover image for #Pre-DAY 1: Laying the Foundation: Docker & Concepts

#Pre-DAY 1: Laying the Foundation: Docker & Concepts

1
Comments
3 min read
#DAY 10: Retrospective & Tuning
Cover image for #DAY 10: Retrospective & Tuning

#DAY 10: Retrospective & Tuning

5
Comments
3 min read
#DAY 9: Accelerating Analysis with Splunkbase
Cover image for #DAY 9: Accelerating Analysis with Splunkbase

#DAY 9: Accelerating Analysis with Splunkbase

1
Comments
3 min read
#DAY 8: Guardian of the Filesystem
Cover image for #DAY 8: Guardian of the Filesystem

#DAY 8: Guardian of the Filesystem

1
Comments
3 min read
#DAY 7: From Data to Detection
Cover image for #DAY 7: From Data to Detection

#DAY 7: From Data to Detection

1
Comments
5 min read
#DAY 6: Closing the On-Prem Loop
Cover image for #DAY 6: Closing the On-Prem Loop

#DAY 6: Closing the On-Prem Loop

1
Comments
3 min read
#DAY 5: Configuring the Data Pipeline
Cover image for #DAY 5: Configuring the Data Pipeline

#DAY 5: Configuring the Data Pipeline

1
Comments
3 min read
#DAY 4: The Field Agent
Cover image for #DAY 4: The Field Agent

#DAY 4: The Field Agent

3
Comments
3 min read
#DAY 3: The Cloud Brain
Cover image for #DAY 3: The Cloud Brain

#DAY 3: The Cloud Brain

5
Comments
4 min read
#DAY 2: From Installation to Operational Verification
Cover image for #DAY 2: From Installation to Operational Verification

#DAY 2: From Installation to Operational Verification

2
Comments
3 min read
#DAY 1: DFIR Lab Setup
Cover image for #DAY 1: DFIR Lab Setup

#DAY 1: DFIR Lab Setup

5
Comments
4 min read
A Technical Deep Dive: Investigating Exchange Exploits and Lateral Movement in Splunk

A Technical Deep Dive: Investigating Exchange Exploits and Lateral Movement in Splunk

1
Comments 2
4 min read
Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project
Cover image for Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project

Breaking & Securing the Web: An HTTP Credential Sniffer and Analyzer Project

1
Comments
5 min read
A Personal Journey: Understanding Reflected XSS Through My DVWA Setup
Cover image for A Personal Journey: Understanding Reflected XSS Through My DVWA Setup

A Personal Journey: Understanding Reflected XSS Through My DVWA Setup

1
Comments
3 min read
A Technical Deep Dive: Exploiting SQL Injection Vulnerabilities
Cover image for A Technical Deep Dive: Exploiting SQL Injection Vulnerabilities

A Technical Deep Dive: Exploiting SQL Injection Vulnerabilities

1
Comments 1
5 min read
Complete Walkthrough Guide: File Integrity Monitoring (FIM) on Windows
Cover image for Complete Walkthrough Guide: File Integrity Monitoring (FIM) on Windows

Complete Walkthrough Guide: File Integrity Monitoring (FIM) on Windows

1
Comments 2
5 min read
File Integrity Monitoring with Wazuh SIEM Tool
Cover image for File Integrity Monitoring with Wazuh SIEM Tool

File Integrity Monitoring with Wazuh SIEM Tool

2
Comments
3 min read
The Art of Recon: What Happens When a Target Only Has One Door?
Cover image for The Art of Recon: What Happens When a Target Only Has One Door?

The Art of Recon: What Happens When a Target Only Has One Door?

Comments
4 min read
From Enumeration to Exploitation: How a Hidden Directory Unlocked Sensitive User Data
Cover image for From Enumeration to Exploitation: How a Hidden Directory Unlocked Sensitive User Data

From Enumeration to Exploitation: How a Hidden Directory Unlocked Sensitive User Data

Comments
5 min read
Wazuh On-Prem Installation for a Single-Node (All-in-One) Made Easy: Complete SIEM Setup Walkthrough
Cover image for Wazuh On-Prem Installation for a Single-Node (All-in-One) Made Easy: Complete SIEM Setup Walkthrough

Wazuh On-Prem Installation for a Single-Node (All-in-One) Made Easy: Complete SIEM Setup Walkthrough

Comments
13 min read
Breaking into Cybersecurity: My Experience and Career Roadmap
Cover image for Breaking into Cybersecurity: My Experience and Career Roadmap

Breaking into Cybersecurity: My Experience and Career Roadmap

Comments
4 min read
loading...