Skip to content

SEIS 666 -- Class Project Submission

Track A: Knowledge Graph + AI System

University of St. Thomas | Spring 2026 | Instructor: Daniel Yarmoluk


Project

Nexus SecOps -- The Definitive Cybersecurity Operations Encyclopedia

Live Site nexus-secops.pages.dev
GitHub github.com/SpaceCadet019/nexus-secops
Stack MkDocs Material 9.7 + custom CSS/JS, deployed on Cloudflare Pages
Cost $0 -- entirely free-tier infrastructure

Domain Rationale

Cybersecurity operations is a domain with deep, interconnected concepts where prerequisite ordering is critical. You cannot learn Detection Engineering without first understanding SIEM fundamentals, log sources, and TTPs. You cannot perform Threat Hunting without first mastering Detection Engineering, Threat Intelligence, and data analysis.

This makes cybersecurity a perfect domain for knowledge graphs. The 448 concepts in Nexus SecOps have 620 directed prerequisite relationships across 10 taxonomy categories. These relationships are not optional metadata -- they are the structural backbone that determines learning effectiveness.

Who Would Pay for This?

Audience Value Proposition
CISOs building SOC training programs Structured prerequisite chains eliminate guesswork in curriculum design. A CISO can generate a learning path from "analyst hire" to "threat hunter" with every prerequisite mapped.
Universities offering cybersecurity courses 448 concepts with validated prerequisite ordering, ready to import into course design tools. Covers CompTIA CySA+, GIAC GCIH, and GIAC GCFA certification domains.
Individuals preparing for certifications The Adaptive Path Generator creates personalized study plans based on current knowledge, using topological sort over the prerequisite graph.
SOC managers Skills gap analysis: map a team's current capabilities against the graph to identify missing competencies and training priorities.

Knowledge Graph Schema

The knowledge graph contains 448 nodes (cybersecurity concepts, IDs C001--C448) connected by 620 directed edges (prerequisite relationships) across 10 taxonomy categories.

Element Schema Example
Node {id, label, group, shape, title, url} {id: "C024", label: "Detection Engineering", group: "T03", shape: "ellipse", ...}
Edge {from, to} (directed: from is prerequisite of to) {from: "C005", to: "C024"} -- "Log Sources" is prerequisite of "Detection Engineering"
Shape box = foundation, ellipse = intermediate, star = goal Foundations have no prerequisites; goals require many

Storage format: JSON (vis.js compatible) with CSV interchange files for bulk analysis.

Interactive viewer: Knowledge Graph Viewer -- click any node to see its prerequisites, dependents, and linked chapters.

For full schema documentation including validation rules, see AI Architecture.


How AI Consumes the Graph

The Nexus Brain (autonomous agent) consumes the knowledge graph in multiple phases of its cognitive cycle:

  1. PERCEIVE phase: Loads the full graph from graph.json. Counts nodes per category, identifies isolated or weakly-connected subgraphs, measures graph density.

  2. ANALYZE phase: Traverses prerequisite chains to perform content gap analysis. For each concept node, checks whether the linked chapter has adequate depth. A concept with 5 prerequisites but only a paragraph of coverage is flagged as a gap.

  3. REASON phase: Injects relevant subgraph context into LLM prompts. When the Brain is generating content about Cloud Container Security (C245), the prompt includes the full prerequisite chain:

    C001 (CIA Triad) -> C042 (Cloud Fundamentals) -> C178 (Container Basics) -> C245 (Cloud Container Security)
    
    This gives the LLM structural awareness -- it knows what concepts the reader has already learned and what to reference.

  4. Adaptive Path Generator: Uses topological sort over the prerequisite DAG to generate personalized learning paths. Given a target concept and a set of "already known" concepts, it computes the minimal prerequisite chain. Available at Path Generator.

GraphRAG: Before and After

The GraphRAG demo shows the same cybersecurity questions answered with and without graph context. Key patterns:

Aspect Without Graph With Graph
Ordering Flat bulleted lists, no dependency structure Layered by prerequisite depth, explicit ordering
Specificity Generic advice ("learn networking") Specific concept references with C-IDs ("start with C005 Log Sources, then C018 SIEM Correlation")
Completeness Misses non-obvious prerequisites Traverses full prerequisite chain, surfaces indirect dependencies
Actionability Vague study recommendations Concrete learning paths with chapter links

The delta is most dramatic for ordering questions -- "What should I learn before threat hunting?" -- where prerequisite chains matter most.


How AI Was Used to Build This

Claude Code (Primary Development Tool)

All content and infrastructure was built across 17 iterative development sessions using Claude Code. Each session followed a structured protocol defined in CLAUDE.md:

  • Read priorities from NEXT_SESSION.md
  • Stabilize: mkdocs build --strict must pass
  • Grow: execute scored priorities
  • Update all state files and push

Claude Code authored all 50 chapters, 40 MicroSims, 26 labs, 56 attack scenarios, 150 purple team exercises, the gamification engine, the knowledge graph, CI/CD pipelines, and the custom dark-first theme.

Nexus Brain (Autonomous Agent)

The Brain runs Monday and Thursday via GitHub Actions, executing a 10-phase cognitive cycle (see AI Architecture for details):

graph LR
    P[PERCEIVE] --> RC[RECALL]
    RC --> A[ANALYZE]
    A --> R[REASON]
    R --> CR[CRITIQUE]
    CR --> RF[REFINE]
    RF --> ACT[ACT]
    ACT --> E[EVALUATE]
    E --> L[LEARN]
    L --> RM[REMEMBER]
    RM -.->|next cycle| P

The Brain autonomously generates threat intelligence blog posts, detection rules, attack scenarios, and content updates -- all validated through CI quality gates before merging.

Multi-LLM Routing

The Brain routes LLM requests across 4 free-tier providers using an epsilon-greedy multi-armed bandit:

Provider Model Role
Mistral Mistral Small Primary reasoning
Google Gemini 2.0 Flash Fast analysis
Groq Llama 3.3 70B Low-latency critique
Cohere Command R+ Structured output

Total infrastructure cost: $0. Every component runs on free tiers.


Content Scale

Category Count Description
Chapters 50 Parts I--VII covering foundations through adversarial AI
Labs 26 Hands-on exercises with synthetic data
MicroSims 40 Interactive HTML simulations (browser-based)
Attack Scenarios 56 SC-009 through SC-064, narrative threat simulations
Purple Team Exercises 150 PT-001 through PT-150, red+blue team drills
CTF Challenges 25 Capture-the-flag style exercises
Quizzes 50 One per chapter, auto-graded
Exam Simulator 100Q 38-domain certification prep simulator
Benchmark Controls 300+ 79 AI-specific controls
Knowledge Graph Concepts 448 Nodes with taxonomy classification
Prerequisite Edges 620 Directed prerequisite relationships
GitHub Actions Workflows 10 Brain, CI, auto-merge, content freshness, etc.
Interactive Tools 17 IR Tabletop Generator, Attack Sim Terminal, Detection Query Browser, etc.
IR Playbooks 10 Incident response runbooks with decision trees
Blog Posts 13 Threat intelligence articles

10-Minute Demo Script

Time Action
0:00--1:00 Open nexus-secops.pages.dev. Show the hero section and stat cards (50 chapters, 300+ controls, 40 sims, etc.). Point out the dark-first theme and responsive design.
1:00--3:00 Navigate to the Knowledge Graph Viewer (Learn > Learning Graph > Graph Viewer). Show the 448-node graph with color-coded taxonomy categories. Click a concept node (e.g., "Detection Engineering") to show its prerequisites panel and linked chapter. Zoom into a cluster to show the prerequisite chain structure.
3:00--5:30 Open the GraphRAG demo results. Walk through Question 1: "What are the prerequisites for Detection Engineering?" Compare the "Without Graph" response (generic flat list) vs. the "With Graph" response (specific C-ID references, layered by prerequisite depth, with chapter links). Highlight how the same LLM produces dramatically different quality with structured context.
5:30--7:30 Switch to GitHub. Open docs/ai-architecture.md and show the 10-phase Brain cycle Mermaid diagram. Explain PERCEIVE through REMEMBER. Show the multi-LLM router table. Open a Brain-generated PR to show an example of autonomous content creation with reasoning trace in the PR description.
7:30--9:00 Live demo: Run python scripts/graph_rag_demo.py --question "What should I learn before threat hunting?" in a terminal. Show the real-time output: first the response without graph context, then the response with graph context injected. Point out the structural difference in output quality.
9:00--10:00 Summary: "Structure beats prompts. The same LLM with structured knowledge graph context produces dramatically better answers than raw prompting. Nexus SecOps demonstrates this at scale -- 448 concepts, 620 prerequisite edges, consumed by an autonomous AI agent that maintains and grows the site without human intervention."

Rubric Alignment

Criteria What Nexus SecOps Delivers
Domain selection and justification Cybersecurity operations: 448 concepts with natural prerequisite ordering. The domain's interconnected structure makes knowledge graphs essential, not optional. Detailed rationale with 4 paying audience segments.
Knowledge graph design 448 nodes, 620 edges, 10 taxonomy categories, 3 shape types, 6 validation rules. Stored as vis.js-compatible JSON with CSV interchange. Interactive viewer with click-to-explore navigation.
AI integration with graph Three-layer architecture: Knowledge Graph + Nexus Brain (10-phase autonomous agent) + GraphRAG. The Brain consumes the graph for content gap analysis, prerequisite chain traversal, and context injection into LLM prompts.
Before/after demonstration GraphRAG demo with 5 cybersecurity questions. Without graph: flat, generic lists. With graph: specific C-ID references, prerequisite-ordered, with chapter links. Delta is measurable and dramatic.
Technical implementation Full-stack: MkDocs Material site, 10 GitHub Actions workflows, epsilon-greedy multi-LLM router, CI quality gates, autonomous PR generation and merging. All free-tier, $0 cost.
Scale and depth 50 chapters, 26 labs, 40 simulations, 56 scenarios, 150 exercises, 25 CTF challenges, 100Q exam, 300+ controls, 17 interactive tools. This is not a demo -- it is a production reference.
Presentation quality Live site at nexus-secops.pages.dev with dark-first theme, responsive design, gamification (XP, streaks, achievements), PWA offline support, keyboard shortcuts, and command palette.
Documentation CLAUDE.md (project protocol), AI Architecture doc (system design), EVOLUTION_LOG.md (17 sessions of iterative development), CONTRIBUTING.md (community contribution guide).