A Refresher on Defensive Security Concepts
1
DS - Deep dive into the core of cybersecurity
2
DS - Managing cybersecurity's legendary pain point: Passwords
3
DS - Managing cybersecurity's legendary pain point: Passwords
4
DS - Mastering defense in depth
5
DS - Mastering defense in depth
6
DS - Comparing the blue and red teams
7
DS - Comparing the blue and red teams
Managing Threats - Vulnerabilities and Risks
1
DS - Understanding cybersecurity vulnerabilities and threats
2
DS - Understanding cybersecurity vulnerabilities and threats
3
DS - Managing cybersecurity risks
4
DS - Managing cybersecurity risks
5
DS - The NIST Cybersecurity Framework
6
DS - Creating an effective Business Continuity Plan (BCP)
7
DS - Creating an effective Business Continuity Plan (BCP)
8
DS - Implementing a best-in-class DRP
9
DS - Implementing a best-in-class DRP
Comprehending Policies | Procedures | Compliance and Audits
1
DS - Creating world-class cybersecurity policies and procedures
2
DS - Creating world-class cybersecurity policies and procedures
3
DS - Understanding and achieving compliance
4
DS - Understanding and achieving compliance
5
DS - Exploring, creating, and managing audits
6
DS - Exploring, creating, and managing audits
7
DS - Applying a CMM
8
DS - Applying a CMM
Patching Layer 8
1
DS - Understanding layer 8 – the insider threat
2
DS - Understanding layer 8 – the insider threat
3
DS - Mastering the art of social engineering
4
DS - Mastering the art of social engineering
5
DS - Defending against social engineering attacks (patching layer 8)
6
DS - Defending against social engineering attacks (patching layer 8)
Cybersecurity Technologies and Tools
1
DS - Advanced wireless tools for cybersecurity
2
DS - Pentesting tools and methods
3
DS - Pentesting tools and methods
4
DS - Dealing with APTs
5
DS - Applying forensics tools and methods
6
DS - Leveraging security threat intelligence
7
DS - Leveraging security threat intelligence
8
DS - Converting a threat into a solution
9
DS - Converting a threat into a solution
Securing Windows Infrastructures
1
DS - Applying Windows hardening
2
DS - Applying Windows hardening
3
DS - Creating a patching strategy
4
DS - Creating a patching strategy
5
DS - Applying security to AD
6
DS - Applying security to AD
7
DS - Mastering endpoint security
8
DS - Mastering endpoint security
9
DS - Leveraging encryption
10
DS - Leveraging encryption
Hardening a Unix Server
1
DS - Securing Unix services
2
DS - Securing Unix services
3
DS - Applying secure file permissions
4
DS - Applying secure file permissions
5
DS - Enhancing the protection of the server by improving your access controls
6
DS - Enhancing the protection of the server by improving your access controls
7
DS - Configuring host-based firewalls
8
DS - Configuring host-based firewalls
9
DS - Advanced management of logs
10
DS - Advanced management of logs
Enhancing Your Network Defensive Skills
1
DS - Using the master tool of network mapping – Nmap
2
DS - Using the master tool of network mapping – Nmap
3
DS - Improving the protection of wireless networks
4
DS - Improving the protection of wireless networks
5
DS - Introducing Wireshark
6
DS - Working with IPS/IDS
7
DS - Working with IPS/IDS
Deep Diving into Physical Security
1
DS - Understanding physical security and associated threats
2
DS - Understanding physical security and associated threats
3
DS - Physical security mechanisms
4
DS - Physical security mechanisms
5
DS - Mastering physical security
6
DS - Mastering physical security
Applying IoT Security
1
DS - Understanding the Internet of Things
2
DS - Understanding IoT networking technologies
3
DS - Understanding IoT networking technologies
4
DS - Improving IoT security
5
DS - Improving IoT security
6
DS - Creating cybersecurity hardware using IoT-enabled devices
7
DS - Creating cybersecurity hardware using IoT-enabled devices
8
DS - Bonus track – Understanding the danger of unauthorized IoT devices
9
DS - Bonus track – Understanding the danger of unauthorized IoT devices
Secure Development and Deployment on the Cloud
1
DS - Secure deployment and implementation of cloud applications
2
DS - Securing Kubernetes and APIs
3
DS - Securing Kubernetes and APIs
4
DS - Hardening database services
5
DS - Hardening database services
6
DS - Testing your cloud security
7
DS - Testing your cloud security
Vulnerability Assessment Tools
1
DS - Dealing with vulnerabilities
2
DS - Dealing with vulnerabilities
3
DS - Using a vulnerability assessment scanner (OpenVAS)
4
DS - Using a vulnerability assessment scanner (OpenVAS)
5
DS - Overview of Nexpose Community
6
DS - Overview of Nexpose Community
Mastering Web App Security
1
DS - Gathering intelligence about your site/web application
2
DS - Leveraging DVWA
3
DS - Leveraging DVWA
4
DS - Overviewing the most common attacks on web applications
5
DS - Overviewing the most common attacks on web applications
6
DS - Using Burp Suite
7
DS - Using Burp Suite
8
DS - SQL injection attack on DVWA
9
DS - SQL injection attack on DVWA
10
DS - Brute forcing web applications' passwords
11
DS - Brute forcing web applications' passwords
Malware Analysis
1
DS - Why should I analyze malware?
2
DS - Types and categories of malware analysis
3
DS - Best malware analysis tools
4
DS - Performing malware analysis
Malware Analysis
1
DS - Why should I analyze malware?
2
DS - Types and categories of malware analysis
3
DS - Best malware analysis tools
4
DS - Performing malware analysis
Practicing Forensics
1
DS - Introduction to digital forensics
2
DS - Digital forensics on defensive security
3
DS - Forensics platforms
4
DS - Finding evidence
5
DS - Mobile forensics
6
DS - Managing the evidence (from a legal perspective)
Leveraging Pentesting for Defensive Security
1
DS - Understanding the importance of logs
2
DS - Understanding the importance of logs
3
DS - Knowing your enemy's best friend – Metasploit
4
DS - Knowing your enemy's best friend – Metasploit
5
DS - Other offensive hacking tools
6
DS - Other offensive hacking tools
Achieving Automation of Security Tools
1
DS - Why bother with automation?
2
DS - Why bother with automation?
3
DS - Types of automated attacks
4
DS - Types of automated attacks
5
DS - Automation of cybersecurity tools using Python
6
DS - Automation of cybersecurity tools using Python
7
DS - Cybersecurity automation with the Raspberry Pi
Practicing Forensics
1
DS - Introduction to digital forensics
2
DS - Digital forensics on defensive security
3
DS - Forensics platforms
4
DS - Finding evidence
5
DS - Mobile forensics
6
DS - Managing the evidence (from a legal perspective)
The Master's Compilation of Useful Resources
1
DS - Free cybersecurity templates
2
DS - Must-have web resources
3
DS - Must-have web resources
4
DS - Industry-leading best practices
5
DS - Industry-leading best practices
Productivity Hacks to Get More Done in 2018
— 28 February 2017
- Facebook News Feed Eradicator (free chrome extension) Stay focused by removing your Facebook newsfeed and replacing it with an inspirational quote. Disable the tool anytime you want to see what friends are up to!
- Hide My Inbox (free chrome extension for Gmail) Stay focused by hiding your inbox. Click "show your inbox" at a scheduled time and batch processs everything one go.
- Habitica (free mobile + web app) Gamify your to do list. Treat your life like a game and earn gold goins for getting stuff done!