Category: Security
-
+
+
+
+
+
+
Working through my SOC Level 1 training, I reviewed some different Threat Intelligence tools. This covered some of the Open-Source Intelligence Tools (OSINT) available on the internet, of which there are tons. You would use things like VirusTotal or AbuseIPBD to track malicious files and IP addresses daily in triage…
-
+
+
+
+
+
+
Learning more about exploitation with the Web Hacking modules! These items cover more about how websites and web requests work, so they cover web request methods and response codes. They also cover how JavaScript and SQL queries work and can be exploited. It then explains how to use Burp Suite’s…
-
+
+
+
+
+
+
Working my way down, I learned about Exploitation today. This is a bit more Red Team stuff, but it is still great information as it gives you insight into tools and techniques that an attack may use. So in this module, I learned about a well-known exploration tool, Metasploit. Metaspolit…
-
+
+
+
+
+
+
Continuing down the Cybersecurity 101 path, I worked on the Cryptography module over the last few days. This module discussed different types of cryptography at a basic level. It includes information about hashing and also teaches the basics of using John the Ripper to run a dictionary attack on a…
-
+
+
+
+
+
+
After working through the many modules, I finished the Networking module for the Cybersecurity 101 learning path. There were many different things here, such as going over basic TCP/IP and the OSI model. Then it got into network traffic and network protocols like TLS and SSH. From there, it moves…
-
+
+
+
+
+
+
Worked through the Cyber Defense Frameworks section and learned a lot about different security frameworks like the Cyber Kill Chain, the Diamond Model, and the Unified Kill Chain. IT also got into learning about the MITRE Attack frameworks and site.
-
+
+
+
+
+
+
While I have been reviewing the Cybersecurity 101 modules on TryHackme.com, I have also been working on the SOC Level 1 modules, which give you training and details on how to work in a SOC. This includes things like Cyber Frameworks, Traffic Analysis, SIEMS, and a lot more.
-
+
+
+
+
+
+
Worked with some Windows Fundamentals today. Windows is still one of the most used OS’s out there, and being the most used also means the most often exploited for cyberattacks. This takes some basics of the Windows system but also gives a basic overview of Active Directory.
-
+
+
+
+
+
+
I walked through some Linux fundamentals today. Linux seems to come up a lot in relation to cybersecurity, as many tools work in Linux regarding EDRs or firewalls, so knowing how to navigate Linux is essential.
-
+
+
+
+
+
+
As they updated the pre-security modules for the new Cybersecurity modules on Tryhackme.com, I decided to go back through them as they added some new modules to the list as well.