Skip to content
View KarimElAtfy's full-sized avatar
  • Politecnico di Milano
  • Milan, Italy

Block or report KarimElAtfy

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
KarimElAtfy/README.md

Hi, I'm Karim

I'm a Computer Engineering student at Politecnico di Milano, currently building practical skills in cloud infrastructure with Azure.

I passed the AZ-900 certification, I'm currently working toward AZ-104, and I'm strengthening my hands-on experience with Terraform, Linux fundamentals, and infrastructure-focused projects.

My goal is to grow through real practice: building, testing, making mistakes, fixing them, and learning by doing.

What I'm focusing on

  • Cloud infrastructure on Azure
  • Infrastructure as Code with Terraform
  • Linux fundamentals for real-world cloud environments
  • Git and GitHub workflows
  • Building practical, recruiter-ready infrastructure projects

Current background

  • Azure — solid practical familiarity with core services and management workflows
  • Terraform — comfortable with the fundamentals and actively using it in projects
  • Git / GitHub — strong day-to-day confidence
  • Linux — basic operational knowledge, currently improving it step by step
  • Bash — basic usage
  • Nginx — basic usage in cloud VM scenarios
  • JSON / ARM / Bicep — can read and understand them, but currently focused more on Terraform
  • Python — academic background, but not yet applied in real projects

Certifications

  • AZ-900: Microsoft Azure Fundamentals
  • Currently preparing for AZ-104, CCNA

Featured Projects

Azure Terraform Secure Private Platform

A production-minded Azure infrastructure project built with Terraform to simulate a more realistic cloud environment with private compute, secure administrative access through Azure Bastion, modular Infrastructure as Code, basic monitoring, and secure secret management foundations.

What it includes

  • Virtual network with dedicated application and Azure Bastion subnets
  • Private ARM64 Linux virtual machine with no public IP
  • Azure Bastion for secure administrative access
  • Network Security Group applied to the application subnet
  • Automated Nginx installation and configuration through cloud-init
  • Log Analytics Workspace and CPU metric alert
  • Azure Key Vault as a foundation for secure secret handling
  • Modular Terraform structure with separate network, compute, bastion, monitoring, and key vault modules

What this project helped me practice

  • Private infrastructure design on Azure
  • Secure VM administration without direct public SSH exposure
  • Terraform modularization and cleaner IaC structure
  • ARM64 Linux VM deployment on Azure
  • cloud-init automation and service bootstrap
  • Basic Azure monitoring and alerting
  • Security-aware infrastructure design
  • Real deployment troubleshooting and validation

Azure Terraform Secure Two-Tier Infrastructure

A hands-on Azure infrastructure project built with Terraform to simulate a more realistic cloud environment with separated management and workload layers, subnet-based security, ARM64 Linux virtual machines, and automated provisioning through cloud-init.

What it includes

  • Virtual network with separate management and web subnets
  • Subnet-based Network Security Groups
  • Dedicated management VM for administrative access
  • Public-facing web VM running Nginx
  • SSH key-based access control
  • Automated VM provisioning with cloud-init
  • ARM64 Ubuntu virtual machines on Azure

What this project helped me practice

  • Azure virtual network and subnet design
  • Network Security Groups and controlled access paths
  • Infrastructure as Code with Terraform
  • Linux VM provisioning and SSH authentication
  • cloud-init automation
  • More realistic infrastructure design beyond a single-VM deployment

Azure Terraform Linux VM

A practical Azure infrastructure project built with Terraform to simulate a small but realistic cloud deployment.

What it includes

  • Virtual network and subnet
  • Network Security Group rules
  • Linux virtual machine with SSH access
  • Automated Nginx installation through cloud-init

What this project helped me practice

  • Azure resource structure
  • Infrastructure as Code fundamentals
  • Basic networking and access control
  • Practical deployment workflow from code to running VM

How I approach learning

I’m trying to move beyond university theory and build real technical experience as early as possible.

I learn best by doing: creating projects, breaking things, understanding mistakes, correcting them, and improving from there.
To me, that is one of the most valuable ways to learn cloud and infrastructure work.

Currently improving

  • Azure administration knowledge
  • Terraform best practices
  • Linux operational confidence
  • Infrastructure design mindset
  • More real-world cloud projects

Languages

  • Italian — native
  • English — C1
  • French — conversational
  • German — currently learning
  • Russian — currently learning

Contact

Pinned Loading

  1. Azure-Terraform-IaC-LinuxVM Azure-Terraform-IaC-LinuxVM Public

    Terraform-based Azure infrastructure project with custom networking, ARM64 Linux VM, SSH access, and nginx bootstrap via cloud-init.

    HCL

  2. Azure-Terraform-IaC-Secure-Two-Tier-Infrastructure Azure-Terraform-IaC-Secure-Two-Tier-Infrastructure Public

    Terraform project deploying a secure two-tier Azure infrastructure with segmented networking, ARM64 Linux VMs, and cloud-init automation.

    HCL

  3. Azure-Terraform-Secure-Private-Platform Azure-Terraform-Secure-Private-Platform Public

    Production-minded Azure infrastructure built with Terraform, featuring private compute, secure administrative access, remote state, and basic monitoring.

    HCL