Skip to content
#

threat-modeling

Here are 152 public repositories matching this topic...

I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilities, detection, incident response, escalation, Wireshark, tcpdump, IDS (Suricata), SIEM (Splunk, Chronicle), and Python automation.

  • Updated Sep 12, 2024
  • Jupyter Notebook

Created a Risk Assessment Report, Threat Modeling Report, Network & Data Security Report, Third-Party Risk Report, Incident Response Plan, Business Continuity Plan, and Executive Summary for VISION (All entities and events in this case study are purely hypothetical. Details of the case study are inspired by real-world events.)

  • Updated Sep 11, 2024

I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilities, detection, incident response, escalation, Wireshark, tcpdump, IDS (Suricata), SIEM (Splunk, Chronicle), and Python automation.

  • Updated Sep 1, 2024
  • Jupyter Notebook

Improve this page

Add a description, image, and links to the threat-modeling topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the threat-modeling topic, visit your repo's landing page and select "manage topics."

Learn more