Courses for Enterprise Security Customers – NOT FREE Learn to install, configure, manage, and use the Splunk App for Enterprise Security. Two learning paths cover both security analysts and Splunk administrators or architects. Splunk Education Progam Courses for FREE: http://www.splunk.com/view/SP-CAAAH9U
Creating systems reports A systems report can be quickly generated by nmap. Simply by scanning a network, an immediate list of systems and their protocols can be seen by using operating system identification (-O) and possibly verbose output (-v) against the complete network (/24): nmap -O -v 192.168.1.0/24 However, the format is unruly, as pages […]
ModSecurity is an open-source web-based firewall application (or WAF) supported by different web servers: Apache, Nginx and IIS. Usage. The module is configured to protect web applications from various attacks. Here’s a lab on modsecurity.
Software engineering — Software product Quality Requirements and Evaluation (SQuaRE). The general goal of creating the SQuaRE set of international standards is to move to a logically organized, enriched, and unified series covering two main processes: software quality requirements specification and software quality evaluation, supported by a software quality measurement process.
The National Institute of Standards released Version 1.0 of the NIST Cybersecurity Framework Feb 12, 2014. The Framework provides a common taxonomy and mechanism for organizations to describe current and target state cybersecurity postures, identify and prioritize opportunities for improvement, and communicate cybersecurity risk. The NIST Cybersecurity Framework Core consists of five concurrent and continuous […]
Paessler Router Traffic Grapher is a server up-time and utilisation, network monitoring and bandwidth usage software package for server infrastructure from Paessler AG. It can monitor and classify bandwidth usage in a network using SNMP, Packet Sniffing and Netflow. It services Microsoft Windows as well as Linux.
BGP (Border Gateway Protocol) is a protocol for exchanging routing information between gateway hosts (each with its own router) in a network of autonomous systems. BGP is often the protocol used between gateway hosts on the Internet. The routing table contains a list of known routers, the addresses they can reach, and a cost metric […]
An autonomous system (AS) is a network or a collection of networks that are all managed and supervised by a single entity or organization. These systems are made up of many different networks but are operated under the umbrella of a single entity for easy management. Large enterprises tend to have large network infrastructures with […]
Security Content Automation Protocol (SCAP) Content SCAP Checklists Security checklists (or benchmarks) that provide detailed low level guidance on setting the security configuration of operating systems and applications. SCAP Enumeration and Mapping Data Feeds SCAP related reference data for tool developers, integrators and SCAP Validated Product users.
Georgia Weidman’s Advanced Penetration Testing Course on Cybrary: https://www.cybrary.it/course/advanced-penetration-testing/ Here is a link to her slides for the above course: https://www.cybrary.it/wp-content/uploads/pdfs/CybraryAdvancedPenSlides.pdf