Cyber Defense

These are Posts about Cyber Defense

Enhance Your Cybersecurity Skills with Practical Linux Projects

Introduction: Welcome to our latest blog post, dedicated to all aspiring cybersecurity enthusiasts! In the dynamic world of cyber security, practical skills are just as crucial as theoretical knowledge. This post is designed to guide you through a series of hands-on Linux projects that will not only elevate your understanding of cybersecurity systems but also

Enhance Your Cybersecurity Skills with Practical Linux Projects Read More »

Harnessing AI in Cybersecurity – Annex Slides

These additional slides were created as part of one of our classes to complement the class slides I’ll cover the story below a little bit in class. The Rise and Rapid Fall of Microsoft’s Tay In the early months of 2016, the digital corridors of Twitter were abuzz with conversations spanning every conceivable topic. Sensing

Harnessing AI in Cybersecurity – Annex Slides Read More »

SIEM Logic Unveiled: How SOC Analysts Detect and Respond to Security Incidents

Many imagine Security Operations Center (SOC) analysts as modern-day ‘Neo’ from ‘The Matrix,’ deciphering cascades of streaming data on glowing screens. However, the reality is quite different. SOC analysts dedicate their days to a meticulous task—sorting through alerts, triaging them, and launching investigations into potential security threats. These alerts arrive from a myriad of security

SIEM Logic Unveiled: How SOC Analysts Detect and Respond to Security Incidents Read More »

Mastering Incident Response: A TLDR Guide to Playbooks and Runbooks with NIST Framework

Welcome to another exciting blog post, students and aspiring cybersecurity professionals! Today, we have a topic that sits at the core of cybersecurity operations—Incident Response. It’s not just about detecting incidents but efficiently managing them to minimize damage and future risks. Whether you’re part of a small IT team or a large Security Operations Center

Mastering Incident Response: A TLDR Guide to Playbooks and Runbooks with NIST Framework Read More »

Vulnerability Categories and Risk Factors

The topic of software and network vulnerabilities is incredibly vast. Vulnerabilities can range from minor issues that pose little to no risk to the business, to significant risks that can bring an organization to its knees. Understanding the categories of vulnerabilities can help you prioritize them effectively. Here’s an in-depth look at various categories and

Vulnerability Categories and Risk Factors Read More »

Cybersecurity Exercise: Understanding and Applying the MITRE ATT&CK Framework

Objective: The aim of this exercise is to familiarize students with the MITRE ATT&CK framework by analyzing various cybersecurity scenarios. By dissecting real-world-like attack narratives, you’ll learn how to identify Tactics, Techniques, and Procedures (TTPs) commonly used by attackers, particularly Advanced Persistent Threats (APTs). Duration: This is a 30-minute exercise broken down into four scenarios,

Cybersecurity Exercise: Understanding and Applying the MITRE ATT&CK Framework Read More »

Unmasking Active Directory Threats: Defending the Heart of Enterprise IT

Active Directory serves as the pulsating core of modern enterprise IT systems. It offers organizations the prowess to efficiently manage an array of IT components, ranging from laptops, desktops, and servers to mobile devices, network equipment, printers, and beyond—essentially, any entity tethered to the network. With the agility it brings, specifying device and user permissions

Unmasking Active Directory Threats: Defending the Heart of Enterprise IT Read More »

Scroll to Top