Hello and welcome to another interview, this time I spoke to a guy with possibly one of the coolest names in Information Security Mr Heath Maverick Adams, how cool of a name is that! Unless this is your first day looking at Information Security, Cyber Security, Ethical Hacking etc I expect you already know him,…
Tag: Cyber Security
Blue Team Boot Camp: Defending Against Hackers by Jonathan Elliott for CodeRed (Review)
Hey Guys, I just recently finished this course ‘Blue Team Boot Camp: Defending Against Hackers’ over on CodeRed which was taught by the excellent Jonathan Elliott. Recently I started a new job, I think I mentioned previously and in it I am being given the chance to learn some security stuff which I absolutely love,…
Introduction to Malware Analysis for Incident Responders by Jason Dion (Review)
Hey Guys, I finished this recently and wanted to write a little bit about it because it was quite fantastic. What you’ll learn You will understand the steps and processes involved in static and dynamic Malware Analysis You will be able to perform basic dynamic Malware Analysis You will understand the various types of malware…
Interview with Kayne McGladrey – vCISO / Spokesperson / Global Cybersecurity Thought Leader / Strategy and GRC Practice Lead
Hey Guys, Today I have an interview with Kayne McGladrey, he is a vCISO / Spokesperson / Global Cybersecurity Thought Leader / Strategy and GRC Practice Lead who I follow on twitter and find extremely interesting J He is a national cybersecurity expert, helping clients develop proactive programs to manage cyber-risk. He is the cybersecurity…
The Complete Cyber Security Course! Volume 4: End Point Protection by Nathan House (Review)
First of all, I have to apologise for the lack of posts the previous few months. After being put on furlough in April I was made redundant in July so when I wasn’t home-schooling the kids with the wife I was searching for jobs bit I am pleased to say I HAVE ONE and started…
Interview with award-winning Security Blogger, Researcher, Podcaster and Public Speaker Graham Cluley
Apologies for the lack of posts of late was really busy working from home and the with all this Corona/COVID 19 stuff I have been made furloughed so have been at home for the last week helping the wife home school. All the rubbish aside I am super excited to bring you this interview I…
CTF: Bandit Level 0 > 1 Walkthrough
Technically the first level after SSH into the server, we now need to start finding flags. Level Goal The password for the next level is stored in a file called readme located in the home directory. Use this password to log into bandit1 using SSH. Whenever you find a password for a level, use SSH…
CTF: Bandit Level 0 Walkthrough
These first few posts on the CTF challenges at ‘Over the Wire’ will be pretty short and basic which I am ok with, the whole purpose of ‘Over the Wire’ is to go from being an absolute beginner with ‘Bandit0 to Bandit34’ through to the others like Narnia and Maze. Suggested order to play the…
The Complete Cyber Security Course! Volume 2 by Nathan House (Review)
This is the second volume of the four-volume course and if you haven’t already you can read my review of volume 1 over here (https://thesecuritynoob.com/course/the-complete-cyber-security-course-volume-1-by-nathan-house-review/). VOLUME 1: HACKER’S EXPOSED VOLUME 2: NETWORK SECURITY VOLUME 3: ANONYMOUS BROWSING VOLUME 4: ENDPOINT PROTECTION I have a huge interest in networking so I was looking forward to getting…
The Complete Cyber Security Course! Volume 1 by Nathan House (Review)
Apologies for the long absence I have been not well most of January but back now and right into it. Since I started this site I have managed to discover some fantastic resources and this course were available on UDEMY at this link HERE, I have it through Station X. I will admit that I…