Search

CyberSecurity


The different fields comprising CyberSecurity are:


1. Computer Networking:

IPTables

PCAP

OSI Model

TCP



2. System Administration:

Operating Systems

Kerberos

Backup

FileSystems


3. Digital/Network Security:

Privacy

Passwords

Cryptography



OPSEC


4. Audit & Compliance:

ISO270001

CIS Controls

Common Criteria

NIST-800


5. Forensics

Disk



Autopsy

Memory

Network


6. Command Line

Coding

Git

Powershell

Bash




7. Reverse Engineering

Fuzzing

Debugging

Assembly

IDA Pro


8. Cyber Operations

Threat Intel

APTs

Cyber Kill Chain

MITRE ATT&CK





Recent Posts

See All

AI behavioral prediction

what you want is ultimately to learn about human behaviors and anticipate them. That’s called behavioral prediction. These behavioral predictions are made using recurrent neural networks: they use pas

Dijkstra shortest path algorithm

Word ladder game (change only one letter to go from Fool to Sage): Fool, Pool, Poll, Pole, Pale, Sale, Sage. How? Dijkstra shortest path algorithm