Pim Beekmans
Home
Blue teaming
Red teaming
Minor Red
Minor Blue
Blue teaming semester
Fontys S3 - Self assessment week 1
Fontys S3 - Network diagram V1
Fontys S3 - Network diagram V2
Fontys S3 - Secure connections
Fontys S3 - IDS/IPS
Fontys S3 - Information Security and Risk Analysis
Fontys S3 - IT Monitoring
Red teaming semester
Fontys S4 - SQL injection
Fontys S4 - Command injection
Fontys S4 - Cross-site scripting
Fontys S4 - Cross-site request forgery
Fontys S4 - Password cracking
Fontys S4 - Network scanning and enumeration
Fontys S4 - Network sniffing and spoofing
Fontys S4 - Law, Ethics and Responsible Disclosure
Fontys S4 - Basic hacking process
Fontys S4 - Self reflection
Minor Red teaming specialisation
Fontys S7 - Pentesting methods
Fontys S7 - HTB Linux write-up
Fontys S7 - HTB Windows write-up
Fontys S7 - Red VS Blue event
Fontys S7 - Lockpicking
Fontys S7 - Personal pen-test toolbox
Fontys S7 - Security of IOT protocols and technology
Fontys S7 - Pentest
Fontys S7 - Vulnerability analysis app
Fontys S7 - Vulnerability analysis website
Fontys S7 - Organizing a weekly HackTheBox event
Minor Blue teaming specialisation
Fontys S7 - WAF
Fontys S7 - IDS Technologies
Fontys S7 - Developing and tuning an IDS
Fontys S7 - Setting up a SOC
Fontys S7 - Vulnerability scanning
Fontys S7 - Professional Article