Welcome To My Portfolio!
It's Nice To Meet You
Tell Me More

Introduction

My project.

Environment

I'm using my own Hyper visor (Proxmox) on a private server in my home. I can connect via a VPN, that's also running on this server, to my home network to remotely manage the server and manage and deploy VM's. The server is an old DELL R610 with 2 Xeon E5649's, 56GB DDR3 registered ecc 1333mhz memory and all VM's are installed on 2 1TB Samsung SSD's running in RAID 1 with a PCIE caching SSD. The server is part of the home network just like every other computer in my home.

Context

This is my portfolio focusing on my development as a Cyber security professional while studying Software engineering and Cyber security and the Fontys.

Security

The network is secured by separating the webservers in their own DMZ. The network is protected by a PFSense router running custom firewall rules for every interface and running Suricata to identify and block possible threats. I also have a SOC running on the network with active NIDS and HIDS protection.

Portfolio

Cyber security.

Blue teaming semester

Fontys S3

Self assessment week 1

Fontys S3

Network diagram V1

Fontys S3

Network diagram V2

Fontys S3

Secure connections

Fontys S3

IDS/IPS

Fontys S3

Information Security and Risk Analysis

Fontys S3

IT Monitoring

Red teaming semester

Fontys S4

SQL injection

Fontys S4

Command injection

Fontys S4

Cross-site scripting

Fontys S4

Cross-site request forgery

Fontys S4

Path traversal

Fontys S4

Password cracking

Fontys S4

Network scanning and enumeration

Fontys S4

Network sniffing and spoofing

Fontys S4

Law, Ethics and Responsible Disclosure

Fontys S4

Basic hacking process

Fontys S4

Self reflection

Internship

Fontys S5

My internship

Minor

Red teaming specialisation

Fontys S7

Pentesting methods

Fontys S7

HTB Linux write-up

Fontys S7

HTB Windows write-up

Fontys S7

Red VS Blue Event

Fontys S7

Lockpicking

Fontys S7

Personal pen-test toolbox

Fontys S7

Security of IOT protocols and technology

Fontys S7

Pentest

Fontys S7

Vulnerability analysis on a smartphone app

Fontys S7

Vulnerability analysis on a website

Fontys S7

Organize a weekly Hack The Box event

Blue teaming specialisation

Fontys S7

WAF

Fontys S7

IDS technologies

Fontys S7

Monitoring technologies

Fontys S7

SIEM technologies

Fontys S7

Threat use cases

Fontys S7

Developing and tuning an IDS

Fontys S7

Setting up a SOC

Fontys S7

Vulnerability scanning

Fontys S7

Professional article

Timeline

My cyber security career.

  • Fontys S3 2019

    The beginning

    This was the first time I got experienced the cyber security stream and what it had to offer. I learned the basics of the defensive side of cyber security.

  • Fontys S4 2020

    Round 2

    This was my second semester on cyber security this time focusing on the offensive side.

  • Fontys S5 2021

    The internship

    Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!

  • Fontys S7 2021

    My minor

    Lorem ipsum dolor sit amet, consectetur adipisicing elit. Sunt ut voluptatum eius sapiente, totam reiciendis temporibus qui quibusdam, recusandae sit vero unde, sed, incidunt et ea quo dolore laudantium consectetur!

  • The
    Future

About me

Some additional links and information.

Pim Beekmans

Student

This is me, thank you for reading, hopefully you've liked my portfolio on cyber security. For additional feedback feel free to send an email to [email protected].