We will use tools like Shodan, Nmap, Maltego, Google Hacks, and Kali Linux to find and exploit weaknesses on networks. The networks will be either virtual networks or networks in which we have permission to explore. We will develop rules of engagement and write pentesting reports.
We will use tools like Wireshark, NetworkMiner, VirusTotal, Autoposy, and others to analyze network traffic, incidents, malware and cyber attacks.
Cyber Risk Assessment
We will use various resources like Shodan, Nmap, the National Vulnerability Database (NVD), Common Weakness Enumeration (CWE), Common Attack Pattern Enumeration and Classification (CAPEC), and MITRE ATT&CK to analyze the risk of networks.
Data Modeling in Cybersecurity
We will link together findings from various cybersecurity resources using a graph-database modeling tool in order to draw new insights and to simplify the work of cybersecurity analysts. This data modeling forms for the foundation of artificial intelligence (AI) work.
We will focus on things like preparing a research paper or a research poster for a cybersecurity conference.
We explore various cybersecurity topics and tools based off of where your curiosity leads us.