top of page

Cybersecurity Projects

Penetration Testing

​

We will use tools like Shodan, Nmap, Maltego, Google Hacks, and Kali Linux to find and exploit weaknesses on networks. The networks will be either virtual networks or networks in which we have permission to explore.  We will develop rules of engagement and write pentesting reports.

Data Center

Cyber Forensics

We will use tools like Wireshark, NetworkMiner, VirusTotal, Autoposy, and others to analyze network traffic, incidents, malware and cyber attacks.

Computer Class

Cyber Risk Assessment

We will use various resources like Shodan, Nmap, the National Vulnerability Database (NVD), Common Weakness Enumeration (CWE), Common Attack Pattern Enumeration and Classification (CAPEC), and MITRE ATT&CK to analyze the risk of networks.

Laptop Keyboard

Data Modeling in Cybersecurity

We will link together findings from various cybersecurity resources using a graph-database modeling tool in order to draw new insights and to simplify the work of cybersecurity analysts. This data modeling forms for the foundation of artificial intelligence (AI) work.

Analysing data

Research Projects

We will focus on things like preparing a research paper or a research poster for a cybersecurity conference.

Research Team

Other Projects

We explore various cybersecurity topics and tools based off of where your curiosity leads us.

Education Books Bookshelves
bottom of page