Under Construction…Stay Tuned
Career Development
- Hack your career |Troy Hunt
- How to Build a Successful Career in Cybersecurity | Daniel Miessler
- WEBCAST: Your 5 Year Plan into InfoSec – Black Hills Information Security
- WEBCAST: John Strand’s 5 Year Plan into InfoSec Part 2 – Black Hills Information Security
Resources: Training, Learning, & Development
- Information Security Training | SANS Cyber Security Certifications & Research
- Trainings for Cyber Security Specialists — ENISA
- https://www.enisa.europa.eu/topics/trainings-for-cybersecurity-specialists/online-training-material/technical-operational#network_forensics
- Digital Forensics Incident Response Training
- HOME – Black Hills Information Security
- DFIR in 120 seconds – Cyberfox
- CLARK | Cybersecurity labs and resource knowledge base
- Windows 10 Guide for IT Pros: Tutorials, Tips & Tricks
- A Firewall Log Analysis Primer | Secureworks
- Check Point Firewall Log Analysis In-Depth
- Malware-Traffic-Analysis.net | Traffic Analysis Exercises
- Understanding Network Intrusions With the Cyber Kill Chain
- Applied Network Defense
- Cheat Sheets – PacketLife.net
- Cheat-Sheets – Malware Archaeology
- Derek Rook · GitLab
- How to get started with Malware Analysis and Reverse Engineering – 0ffset
- PowerShell scripts and modules | Patrick Gruenauer
- RE for Beginners | Reverse Engineering
- Malware Analysis Tools
- Sign in
- Vitali Kremez | Ethical Hacker | Reverse Engineer
- OALabs | Where malware analysis meets Incident Response
- kirk-sayre-work/VBASeismograph
- VBA Stomping — Advanced Maldoc Techniques – WalmartLabs – Medium
- Regular-Expressions.info | Regex Tutorial, Examples and Reference
- yara_tools: Create YARA Rules In Python – Michael Matonis – Medium
- Automate the Boring Stuff with Python
- Python is the Future of OSINT – How to Stay Ahead
- Python, Your Friendly OSINT Helper
- Peerlyst
- Gathering Open Source Intelligence
- Open Source Intelligence Gathering 101
- Open Source Intelligence Gathering 201 (Covering 12 additional techniques)
- defendthehoneypot/incidentresponse
- Hunting with Splunk: The Basics
- fr0gger/vthunting
- olafhartong/ThreatHunting
- OSINT Resources for 2019 – Steve Micallef – Medium
- 2019 OSINT Guide
- CTI Reading List – Scott J Roberts – Medium
- MWR | Threat Intelligence: Collecting, Analyzing, Evaluating
- splunk-fundamentals-1
- https://www.proofpoint.com/us/support/technical-training
- Recommended Reading | The Homepage of @attrc
- Complete Meteor.js Tutorial
- https://www.giac.org/certification/security-expert-gse
- Hacksplaining
- Build a Modern Computer from First Principles: From Nand to Tetris (Project-Centered Course)
- Windows Privilege Abuse: Auditing, Detection, and Defense
- Detecting Emotet and Preventing Lateral Movement
- How to build a web application using Flask and deploy it to the cloud
- OSCP Journey: Exam & Lab Prep Tips
- LinuxServer.io
- Weekend Scripter: The Best Ways to Learn PowerShell
- Python for Network Engineers
- FuzzySecurity
- The Web Application Hacker’s Handbook
- Linux elevation of privileges
- Windows elevation of privileges
- CTF Series
- adon90/pentest_compilation
- Keyboard shortcuts in Windows
- highmeh/pentest_scripts
- UIC Academy
- Online Courses – Anytime, Anywhere | Udemy
- Basic Malware Analysis Lab Setup
- 5 Python Libraries for Cyber Security – EdibleSec – Medium
- Basics of Computing | corkami/pics
- Yara-Rules/rules
- http://ironmoon.net/2019/02/04/My-Forensic-and-Incident-Response-Note-Taking-Methodology.html
- Open Security Training
- DFIR Cheetsheets
- Blue Team Tips
- olafhartong