This is a series of blog posts and labs intended to help educate security admins/architects/auditors on several key topics of cybersecurity.
See below for links to the full blog post series or go to the LABS folder for links to the labs.
- Cloud Architecture Frameworks and Benchmarks
- Cybersecurity Documentation Essentials
- Zero Trust Essentials
- Cost Management Tips for Cyber Admins
- Evaluating Your Security Posture: Security Assessment Basics
- Important Security Defenses to Help Your CISO Sleep at Night
- How to create the asset inventory you probably don't have
- The Blue Team Manifesto: Improving Security Operations Workflow
- Guardians of the Gateway: Identity and Access Management Best Practices
- CSPM, CNAPP, CIEM, CWPP – Oh My!
- Scanning the Matrix: SIEM Best Practices
- EDR – The Multi-Tool of Security Defenses
- The Underdog of Cybersecurity: Uncovering Hidden Value in Threat Intelligence
- The Invisible Battleground: Essentials of EASM
- Cyber Exterminators: Monitoring the Shop Floor with OT Security
- The Sentinel’s Watch: Building a Security Reporting Framework
- Clockwork Blue: Automating Security Defenses with SOAR and AI
- Secure Access Service Edge: Another Multi-Tool for the SOC
- The Secret Cipher: Modern Data Loss Prevention Solutions
- Protecting Zion: InfoSec Encryption Concepts and Tips
"By the pricking of my thumbs, Something wicked this way comes." (Macbeth: Second Witch, Act 4 Scene 1)
The Problem: - APT42a is attacking! - Using your knowledge from the above cyber topics, and the additional topics below, build an end-to-end cyber solution for ZPM International!
- The Art of Deception: Turning the Tables on Attackers with Active Defenses
- Knowing your Enemy: Situational Awareness in Cyber Defenses
- Cloudy with a Chance of Hackers: Protecting Critical Cloud Workloads
- Your Money or Your Data: Ransomware Readiness Planning
- The Bug Stops Here: Using DevSecOps Workflows for Pest-Free Applications
- The Willy Wonka World of Application Security Defenses
- Sentinels of Ex Machina: Defending AI Architectures