Hey guys, If you haven’t read the previous articles here they are:- Week One Week Two Since the last post I have worked through the two lab exercises for module 1 which are these:- Qualitative Risk Assessment Using PILAR Risk Management Tool This lab demonstrates how to perform a Qualitative Risk Assessment using PILAR Risk…
Category: Course
Week Two of EC-Council Certified Incident Handler (ECIH) Version 2 Self-Study Training.
Hello, Welcome to week two of doing my ECIH self-study training, I am calling it week two but really its 2 and 3. The main thing I have learnt this week or so is that the course is nowhere near as easy as I thought it was going to be, this is a good thing…
Week One of EC-Council Certified Incident Handler (ECIH) Version 2 Self-Study Training.
Hello, So, as mentioned previously I have started EC-Council Certified Incident Handler (ECIH) Version 2 self-study last week and so I thought I would share with you my initial thoughts and what I have done so far. Who am I and why this course? Since stating this site and journeying into cybersecurity I have taken…
Metasploit5 Basics for Hackers by Occupy the Web (Review)
Hello, So, I have been lucky enough to be working my way through this newly released book Metasploit5 Basics for Hackers by Occupy the Web who you know I am a fan of from ‘Linux Basics for Hackers’ by Occupy the Web & No Starch Press (Review) and ‘Getting Started Becoming a Cyber Warrior’ by…
(CRTO) Certified Red Team Operator Review by Zero Point Security REVIEW
Hey Guys, so I have been working through this ‘Red Team Ops’ ALL WEEKEND (well technically Thursday) and thought I would write about it. Course Overview:- “Red Team Ops is an online course that teaches the basic principals, tools and techniques, that are synonymous with red teaming. Students will be granted access to the course…
Just Completed ‘Cyber Defence Pathway’ at TryHackMe.
Hello Guys, So I thought I would share this today as I’ve just finished the ‘Cyber Defence Pathway’ over at TryHackMe. The pathway has THIRTY NINE rooms in it and is set to take you approximately FORTY EIGHT hours but counting up was probably closer to fifty two or so. “Cyber DefenseThe Cyber Defense path…
The Art of Exploitation Course by Mohamed Atef for Station X (Review)
Hey Guys, Back with another review and this time, it is ‘The Art of Exploitation’. This course if taught by Mohamed Atef:- “Information Security Consultant, Senior Penetration tester and Certified Instructor with more than 20 years of experience. CISSP, CEH, CEI, CISM, CISA, Security+, CCNP, CCSI, MCT, MCSE+ Security, MCITP, PMP, N+, RHCE, Linux+” Course…
OSINT: Fun with Open Source Intelligence by Pentester Academy (review)
Hello, today I have another review for you and this time from ‘Pentester Academy’. I have a year access to their site/courses/Labs and am aiming to do one a month over the next year alongside courses from other places too, and for the first one I decided to one on the easier side to ease…
Blue Team Boot Camp: Defending Against Hackers by Jonathan Elliott for CodeRed (Review)
Hey Guys, I just recently finished this course ‘Blue Team Boot Camp: Defending Against Hackers’ over on CodeRed which was taught by the excellent Jonathan Elliott. Recently I started a new job, I think I mentioned previously and in it I am being given the chance to learn some security stuff which I absolutely love,…
Introduction to Malware Analysis for Incident Responders by Jason Dion (Review)
Hey Guys, I finished this recently and wanted to write a little bit about it because it was quite fantastic. What you’ll learn You will understand the steps and processes involved in static and dynamic Malware Analysis You will be able to perform basic dynamic Malware Analysis You will understand the various types of malware…