Showing posts with label Cybersecurity. Show all posts
Showing posts with label Cybersecurity. Show all posts

Thursday 28 September 2023

2023 October - Free Cybersecurity Trainings

Free Cybersecurity Courses
  1. Certified in Cybersecurity℠ - CC by ICS2: https://www.isc2.org/Certifications/CC
  2. Cybersecurity Essentials by Cisco Academy: https://www.netacad.com/courses/cybersecurity/cybersecurity-essentials
  3. Networking Essentials by Cisco Academy: https://www.netacad.com/courses/networking/networking-essentials
  4. Intro to Information Security by Udacity: https://www.udacity.com/course/intro-to-information-security--ud459
  5. Network Security by Udacity: https://www.udacity.com/course/network-security--ud199
  6. NSE 1,2 & 3 by Fortinet: https://training.fortinet.com/
  7. Information Security by OpenLearn: https://www.open.edu/openlearn/science-maths-technology/information-security
  8. Network Security by OpenLearn: https://www.open.edu/openlearn/digital-computing/network-security
  9. Risk Management by Open Learn: https://www.open.edu/openlearn/money-business/risk-management
  10. Introduction to Cybersecurity by Cisco Academy: https://www.netacad.com/courses/cybersecurity/introduction-cybersecurity
  11. CCNA Security Courses by various platforms: https://digitaldefynd.com/best-network-security-courses/?redirccnasecurity/
  12. Network Defense Essentials (NDE) by EC Council: https://codered.eccouncil.org/course/network-defense-essentials
  13. Ethical Hacking Essentials (EHE) by EC Council: https://codered.eccouncil.org/course/ethical-hacking-essentials
  14. Digital Forensics Essentials (DFE) by EC Council: https://codered.eccouncil.org/course/digital-forensics-essentials
  15. Dark Web, Anonymity, and Cryptocurrency by EC Council: https://codered.eccouncil.org/course/introduction-to-dark-web-anonymity-and-cryptocurrency
  16. Digital Forensics by Open Learn: https://www.open.edu/openlearn/science-maths-technology/digital-forensics
  17. AWS Cloud Certifications (Cybersecurity) : https://explore.skillbuilder.aws/learn/signin
  18. Microsoft Learn for Azure: https://learn.microsoft.com/en-us/training/azure/
  19. Google Cloud Training: https://cloud.google.com/learn/training
  20. Android Bug Bounty Hunting: Hunt Like a Rat: https://codered.eccouncil.org/course/android-bug-bounty-hunting-hunt-like-a-rat
  21. Vulnerability Management: https://www.qualys.com/training/
  22. Software Security: https://www.classcentral.com/course/software-security-1728
  23. Developing Secure Software: https://training.linuxfoundation.org/training/developing-secure-software-lfd121/
  24. PortSwigger Web Hacking: https://portswigger.net/web-security
  25. RedTeaming: https://taggartinstitute.org/p/responsible-red-teaming
  26. Splunk: https://www.splunk.com/en_us/training/free-courses/overview.html
  27. Secure Software Development: https://training.linuxfoundation.org/training/developing-secure-software-lfd121/
  28. Maryland Software Security: Free Course: Software Security from University of Maryland, College Park | Class Central
  29. Stanford Cyber Resiliency: https://www.classcentral.com/classroom/youtube-stanford-seminar-engineering-cyber-resiliency-a-pragmatic-approach-110018
  30. Cyber Threat Intelligience: Cyber Threat Intelligence 101 Course (arcx.io)

Tuesday 19 September 2023

Cybersecurity Technologies and Projects


Cybersecurity is the activity of defending a business's data or information against online criminals. Attackers are giving up the conventional or outdated techniques of getting data from customers as the world adjusts to the new reality. They are adjusting to new technologies and techniques that can be used to steal data electronically. Cyber attackers try to get into the network and launch an attack, while cyber defenders try to block or stop the attackers from accessing their data. This is a game of cat and mouse in the world of cyber security. But instead of using physical weapons, these conflicts make use of a variety of the greatest cyber security tools. The same tool can be used in both positive and bad ways.

The significance of cybersecurity can be understood through Mimecast's study. According to the research, there has been a 26% increase in ransomware, an 88% increase in email-based spoofing, and a 67% increase in impersonation fraud.

The following is a list of cybersecurity technologies and projects that could help in resolving modern security issues:

1. NETWORK ANALYSIS
  1. Wireshark: https://www.wireshark.org
  2. pfSense: https://www.pfsense.org
  3. Arkime: https://arkime.com
  4. Snort: https://www.snort.org
  5. Suricata: https://suricata.io/

2. OS ANALYSIS
  1. Helk: https://github.com/Cyb3rWard0g/HELK
  2. Volatility: https://github.com/volatilityfoundation/volatility/
  3. RegRipper: https://github.com/keydet89/RegRipper3.0
  4. OSSEC: https://www.ossec.net
  5. osquery: https://osquery.io

3. INCIDENT MANAGEMENT
  1. TheHive: https://thehive-project.org/
  2. GRR Rapid Response: https://github.com/google/grr

4. HONEYPOTS
  1. Kippo: https://github.com/desaster/kippo
  2. Cowrie: https://github.com/cowrie/cowrie
  3. Dockpot: https://github.com/eg-cert/dockpot
  4. HonSSH: https://github.com/tnich/honssh

5. THREAT INTELLIGENCE
  1. Misp: https://www.misp-project.org/
  2. MSTICPy: https://github.com/microsoft/msticpy
  3. Threatpost: https://threatpost.com/
  4. Dark Reading: https://www.darkreading.com/
6. EDR
  1. Cortex XDR: https://www.paloaltonetworks.es/resources/datasheets/cortex-xdr
  2. Cynet 360: https://www.cynet.com/platform/
  3. FortiEDR: https://www.fortinet.com/lat/products/endpoint-security/fortiedr
  4. Xcitium: https://www.xcitium.com/free-edr/
7. SIEM
  1. OSSIM: https://cybersecurity.att.com/products/ossim
  2. Splunk: https://www.splunk.com
  3. LogRhythm: https://logrhythm.com
  4. Wazuh: https://wazuh.com
  5. Qradar: https://www.ibm.com/community/qradar/ce/

FREE Cybersecurity Certifications

Here's 15 FREE courses provided by the Qualys. The cybersecurity firm Qualys focuses on providing cloud-based security and compliance so...