Vulnerability Management
- Hasty Versus Deliberate Exploits
- Password Cracking
- PII & How to Protect It
- Nmap & Getting to Know Thy Enemy
- Compiling Apache2 Source Code
- Understanding iptables Syntax
- Ethics in Handling Plain-Text Information
Network Security Monitoring
- Let Me Teach You: Bro
- Hosting a Mini SIEM
- Using RBAC to Organize a SOC Web Portal
- A Wiki for Your SOCs
- Chewing on Malware Packet Captures
Digital Forensics
Incident Response
Guides
- How to Clone a GitHub Repo Using SSH
- How to Apply DISA STIGs
- Nessus: Tuning Guide
- Nessus: User Guide
- Windows Group Policy
- Windows Firewall: Troubleshooting
- Nessus: Troubleshooting
- VirtualBox: CentOS
- Security Onion 16: Deployment Guide
- Security Onion 16: Troubleshooting
- Security Onion 16: Tuning
- Digital Forensics: Microsoft Windows
- Incident Response: Linux
- McAfee ePO: Deployment Guide
- Nessus: Deployment Guide
- CliffsNotes for Cyber Security Laws