Advanced Search
Search Results
681 total results found
Linux Distro Installs
What if we tried out a bunch of Linux distributions?
Arch Linux
megachad simulator Create a File System Wipe Partitions The goal of this section is to create 3 partitions: efi (boot), swap, and root. Search for partitions using fdisk -l. wipefs <path_to_partition> for whatever partitions you decide to nuke. fdisk to ...
Software Defined Networking
A technology that allows network and security professionals to manage, control, and make changes to a network. SDN is basically a giant UI wrapper for the many different text-based configuration files scattered across the many services and machines that compo...
Embedded and Specialized Devices
An enumeration of the many types of embedded/IoT devices. Device Types Home Appliances Environment Controls (HVAC) Building/Facility Automation Lighting Controls Security Systems Door Locks Sprinkler Systems Garage Doors Smart Meters Wearabl...
Mainframe
its actually real? A mainframe computer is a large, powerful computer that is capable of processing extremely large amounts of data, usually running proprietary operating systems that are rarely updated.
Unit 10
Securing Embedded Systems
lock them in a white room. Smart devices are popular, but they are a black box. The consumer usually has little ot no control over the technology being used within said smart devices, and vendors are known to be slow with rolling out security updates for thei...
Email Security
who even still uses email anyway Email is cleartext by default. However, S/MIME and PGP are used to secure email. They both use certificates to provide authentication, message integrity, non-repudiation, and privacy. Secure Multipurpose Internet Mail Extensi...
Unit 11
Governance and Accountability
who in tel aviv can i blame for all my problems Governance practices ensure organizations abide by all applicable cybersecurity laws and regulations to protect them from legal liability. Governance oversees: regulatory compliance requirements contractual ...
Data Governance Roles
role-based access control redux Role Description Role Owner A senior (executive) role with ultimate responsibility for maintaining the confidentiality, integrity, and availability of an information asset. A high-ranking employee, li...
Unit 12
Third Party Vendors
just don't get third partied uhhh third parties are sometimes good and sometimes bad. choose the good ones to do business with. Third-Party Relationships (Raw Lesson Content) VendorĀ - A vendor is a company that sells an organization's goods or provides su...
Rules of Engagement
the parameters and expectations for third-party relationships we need to expect a certain level to be met when partnering professionally with professed professionals The Expectations Roles and Responsibilities (who is responsible to do what in this partne...
Vendor Assessment
how do we know which third-party vendors to do business with? uhhh just do a bunch of stuff on them. lowkey experiment on them. Penetration Testing Right to Audit Clause Proof of Internal Audits Independent Assessments Supply Chain Analysis Audits a...