Author: Chad K. Bachoo, A+ Innovation Fellow, Navy Veteran 🎖️
Institution: The Knowledge House, New York
Cohort: NY-IF-CS-26 (February 2026)
Lead Instructor: George Robbins
This repository serves as the primary technical staging environment for the Cybersecurity Foundations Intensive. It reflects a rigorous Purple Team methodology, integrating defensive posture with offensive insight to ensure mission readiness regardless of hardware limitations [1, 3].
- Network Defense: Implementing robust firewalls and rule-based access controls.
- Security Automation: Utilizing Python for rapid deployment of security tasks.
- Infrastructure Scaling: Managing hybrid virtual environments via Termux and GitHub Codespaces.
- Confidentiality: Access is restricted using Multi-Factor Authentication (MFA) and private SSH keys, adhering to CIS Control #5 [4, 5]. Personally Identifiable Information (PII) is sanitized to protect identity.
- Integrity: The use of Git cryptographic hashing ensures configuration tracking and Non-repudiation [4, 6]. Every commit provides a verifiable audit trail of technical actions.
- Availability: Resiliency is maintained through GitHub Codespaces deployment, providing hardware-agnostic, cloud-native access to the workstation [7, 8].
- Authentication: Phishing-resistant MFA on the GitHub platform [7].
- Authorization: Principle of Least Privilege (PoLP) applied to branch permissions [7].
- Accounting: All technical actions are logged via the GitHub Audit Log for full traceability [7, 9].
This project utilizes a specialized security stack to ensure environment integrity while working from a mobile device:
- Local Environment: Termux (Android Linux Virtualization) provides the local engine for initial staging and script testing.
- Cloud Environment: GitHub Codespaces (Ubuntu-based Linux) provides the primary workstation, ensuring high availability.
- DNS Security: Quad9 (Encrypted DNS/Threat Blocking) acts as the shield, blocking malicious domains and preventing traffic sniffing [User Query].
- Software Provenance: F-Droid (Verified Open-Source Repository) ensures the integrity of mobile security tools [User Query].
- Documentation: Linux Command Library serves as the primary reference for POSIX-compliant syntax [User Query].
The environment is verified using an automated Python script that audits the OS platform and Git status. A successful audit confirms:
- OS Platform: linux
- Git Status: Operational ✅
- Mission Status: Verified & Ready ✅
Faced with hardware limitations while awaiting equipment, this workstation was engineered to prove that a cybersecurity professional's value lies in their methodology, not their hardware. By pivoting from local mobile virtualization to cloud-native Ubuntu environments, this project serves as a case study in infrastructure scaling and resilient engineering [1, 9].
To establish a structured, automated security workstation for auditing and evidence collection.
- Termux: Handheld Linux (Sandboxed Android Environment)
- Codespaces: Virtualized VMware/Linux Workstation
- Packet Tracer: Network Simulation & Traffic Generation
- scripts/: Contains
lab_audit.pyfor automated environment verification. - pcap/: Directory staged for network traffic capture (Packet Tracer Exports).
- slack/: Directory staged for incident response logs and alerts.
- Linux Environment: Operational (Termux/Codespaces)
- Python Security Script: Verified
- Git/GitHub Integration: Mission Ready
- Center for Internet Security. (2024). CIS Controls v8.1. [10].
- CompTIA. (2025). A+ Core Certification Study Guide. [10].
- National Institute of Standards and Technology. (2024). NIST Cybersecurity Framework (CSF) 2.0. [10, 11]. Verified via Termux on Samsung Note 20 Ultra - Feb 2026