Skip to main content
Link
Menu
Expand
(external link)
Document
Search
Copy
Copied
About
⚠️ Risk Management
Botium Toys Security Audit
💥 Threat Analysis
Analyzing WannaCry with MITRE ATT&CK
PASTA Threat Modeling for a Sneaker App
USB Baiting Attack Vectors
👁️ Vulnerability Analysis
Nessus Scanning Exercise
Vulnerability Assessment for a Small Business
🚨 Incident Response
DDoS Attack Incident Report
Investigating Logins With SQL
🗝️ Identity & Access Mgmt
Configuring AAA Services
Configuring a TACACS+ Server
File Permissions in Linux
🌐 Networking Fundamentals
Configuring PAT
Configuring a DHCP Server
Configuring a VLAN
🔒 Network Security
Configuring ACLs
Configuring SSH
Configuring WPA2 and AES
Configuring a Site-to-Site VPN
Configuring a Syslog Server
Disable Unused Services/Ports
Exposed Login via Wireshark
Switch MAC Filtering
Switch Port Security
Windows Defender Firewall
tcpdump Network Traffic Analysis
🔧 Network Troubleshooting
Rogue DHCP Server
Troubleshooting OSPF
Unresponsive DHCP Server
VLAN Mismatch
🗂️ SIEM Labs
Splunk Dashboard Exercise
🐍 Python
Using Python for File Updates
My LinkedIn
Risk management projects are listed here!
Table of contents
Botium Toys Security Audit