Start Your Cyber Security Journey
Offensive Security Intro
- What is Offensive Security?
- Hacking your first machine
- Careers in cyber security
Defensive Security
- Introduction to Defensive Security
- Areas of Defensive Security
- Practical Example of Defensive Security
๐ Notes
What is Offensive Security Intro?
- Beginning Your Learning Journey
Hacking your first machine
gobuster -u http://fakebank.thm -w wordlist.txt dir
Careers in cyber security
- Penetration Tester, Red Teamer, Security Engineer
Introduction to Defensive Security
- Preventing intrusions
- Detecting intrusions
- Blue teams are part of the defensive security landscape
- User cyber security awareness
- Documenting and managing assets
- Updating and patching systems
- Setting up preventative security devices
- Setting up logging and monitoring devices
Areas of Defensive Security
- Security Operations Center (SOC)
- Vulnerabilities
- Policy violations
- Unauthorized activity
- Network intrusions
- Threat Intelligence
- Digital Forensics and Incident Response (DFIR)
- Digital Forensics
- Incident Response
- Malware Analysis
- Digital Forensics
- File System
- System memory
- System logs
- Network logs
- Incident Response
- Preparation
- Detection and Analysis
- Containment, Eradication, and Recovery
- Post-Incident Activity
- Malware Analysis
- virus is a piece of code
- Trojan Horse
- Ransomware
- Static analysis
- Dynamic analysis
Practical Example of Defensive Security
- Simulating a SIEM
๐ง Conclusion:
This was a very short introduction.