Pinned Repositories
2018-Tesla-Data-Breach
As part of this task I was required to map the Tesla Data Breach to the MITRE ATT&CK framework. From here I select any 2 specific ‘techniques’ from the incident and replicate both on a ‘proof of concept’ basis. This will allow me to display my understanding by synthesizing the selected technical techniques. I'll document 2 techniques in this repo.
2019-Capital-One-Breach
Repository was created to highlight the advantages of Project Calico and Open Source Falco, and how they could have been used to prevent the Capital One Data Breach
ARP-Spoofing-Attack
The Address Resolution Protocol (ARP) is a communication protocol used for discovering the link layer address, such as the MAC address, given an IP address. The ARP protocol is a very simple protocol, and it does not implement any security measure.
cyber-students
Shared Project for Modern Cryptography and Security Management & Compliance
decentralised-vault-manager
Smart contracts can accept, store, and distribute native tokens. Solidity, the most popular programming language for writing smart contracts for the EVM, has built-in functionality to support this.
Falco-MicroK8s
Setting up Falco's Kubernetes Audit plugin for MicroK8s
falco-tetragon-cncf
Running Falco & Tetragon together to achieve cloud-native detection & response (CDR)
falco-website
Source code of the official Falco website
local-k8s-lab-security
Setting-up a local Kubernetes lab for security testing
Tetragon-Lab
Lab documentation for testing Tetragon Security Capabilities
nigeldouglas-itcarlow's Repositories
nigeldouglas-itcarlow/Falco-MicroK8s
Setting up Falco's Kubernetes Audit plugin for MicroK8s
nigeldouglas-itcarlow/2018-Tesla-Data-Breach
As part of this task I was required to map the Tesla Data Breach to the MITRE ATT&CK framework. From here I select any 2 specific ‘techniques’ from the incident and replicate both on a ‘proof of concept’ basis. This will allow me to display my understanding by synthesizing the selected technical techniques. I'll document 2 techniques in this repo.
nigeldouglas-itcarlow/cyber-students
Shared Project for Modern Cryptography and Security Management & Compliance
nigeldouglas-itcarlow/ARP-Spoofing-Attack
The Address Resolution Protocol (ARP) is a communication protocol used for discovering the link layer address, such as the MAC address, given an IP address. The ARP protocol is a very simple protocol, and it does not implement any security measure.
nigeldouglas-itcarlow/falco-tetragon-cncf
Running Falco & Tetragon together to achieve cloud-native detection & response (CDR)
nigeldouglas-itcarlow/Tetragon-Lab
Lab documentation for testing Tetragon Security Capabilities
nigeldouglas-itcarlow/2019-Capital-One-Breach
Repository was created to highlight the advantages of Project Calico and Open Source Falco, and how they could have been used to prevent the Capital One Data Breach
nigeldouglas-itcarlow/decentralised-vault-manager
Smart contracts can accept, store, and distribute native tokens. Solidity, the most popular programming language for writing smart contracts for the EVM, has built-in functionality to support this.
nigeldouglas-itcarlow/falco-website
Source code of the official Falco website
nigeldouglas-itcarlow/local-k8s-lab-security
Setting-up a local Kubernetes lab for security testing
nigeldouglas-itcarlow/oss-cnapp
Documenting the requirements for an open-source CNAPP platform
nigeldouglas-itcarlow/pentesting-mainproject
pentesting-mainproject
nigeldouglas-itcarlow/pentesting-xss
The goal is to fix 11 PHP webpages that can be exploited by Cross-Site Scripting (XSS).
nigeldouglas-itcarlow/www-project-kubernetes-top-ten
OWASP Foundation Web Respository