Pim Beekmans Profile_Picture
  • Home
  • Blue teaming
  • Red teaming
  • Minor Red
  • Minor Blue

Blue teaming semester

  • Fontys S3 - Self assessment week 1
  • Fontys S3 - Network diagram V1
  • Fontys S3 - Network diagram V2
  • Fontys S3 - Secure connections
  • Fontys S3 - IDS/IPS
  • Fontys S3 - Information Security and Risk Analysis
  • Fontys S3 - IT Monitoring

Red teaming semester

  • Fontys S4 - SQL injection
  • Fontys S4 - Command injection
  • Fontys S4 - Cross-site scripting
  • Fontys S4 - Cross-site request forgery
  • Fontys S4 - Password cracking
  • Fontys S4 - Network scanning and enumeration
  • Fontys S4 - Network sniffing and spoofing
  • Fontys S4 - Law, Ethics and Responsible Disclosure
  • Fontys S4 - Basic hacking process
  • Fontys S4 - Self reflection

Minor Red teaming specialisation

  • Fontys S7 - Pentesting methods
  • Fontys S7 - HTB Linux write-up
  • Fontys S7 - HTB Windows write-up
  • Fontys S7 - Red VS Blue event
  • Fontys S7 - Lockpicking
  • Fontys S7 - Personal pen-test toolbox
  • Fontys S7 - Security of IOT protocols and technology
  • Fontys S7 - Pentest
  • Fontys S7 - Vulnerability analysis app
  • Fontys S7 - Vulnerability analysis website
  • Fontys S7 - Organizing a weekly HackTheBox event

Minor Blue teaming specialisation

  • Fontys S7 - WAF
  • Fontys S7 - IDS Technologies
  • Fontys S7 - Developing and tuning an IDS
  • Fontys S7 - Setting up a SOC
  • Fontys S7 - Vulnerability scanning
  • Fontys S7 - Professional Article