Learn by Directing AI
Home
/
Cybersecurity
/
Network Exploitation and Threat Modelling
Brief
1
2
3
4
5
6
Materials
Chat
Network Exploitation and Threat Modelling
Units
1
The Brief and the Lab Environment
2
Passive Reconnaissance and Threat Modelling
3
Network Service Exploitation with Metasploit
4
SIEM Configuration and Detection Rules
5
Remediation and Fix Selection
6
The Assessment Report
Materials
Chat with Marie-Claire Desrosiers
Materials
alloy-config.river
CLAUDE.md
docker-compose.yml
app.py
Dockerfile
init_db.py
requirements.txt
index.html
patients.html
record.html
Dockerfile
lab-results-march.csv
patient-summary-q1.csv
pharmacy-inventory.csv
vsftpd.conf
loki.yml
report-template.md
scope-document.md
create_user.sh
Dockerfile
sshd_config
threat-model-template.md
ttp-selection-template.md
Dockerfile
README-internal.md
clinic-1.conf
clinic-2.conf
clinic-3.conf
clinic-4.conf
clinic-5.conf
clinic-6.conf
All materials
requirements.txt
Copy
txt
requirements.txt
Flask