Skip to content
#

threat-modeling

Here are 140 public repositories matching this topic...

I developed a rigorous cybersecurity project portfolio on mock clients covering NIST, audits, Linux, SQL, assets, threats, vulnerabilities, detection, incident response, escalation, Wireshark, tcpdump, IDS (Suricata), SIEM (Splunk, Chronicle), and Python automation.

  • Updated Mar 5, 2024
  • Jupyter Notebook

Improve this page

Add a description, image, and links to the threat-modeling topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the threat-modeling topic, visit your repo's landing page and select "manage topics."

Learn more