Template Resources

NIST Cybersecurity Framework – NIST is considered the gold standard for cybersecurity frameworks, use this guide to inform your businesses cyber framework. SANS Cybersecurity Policies – Free to use policies and procedures covering most topics in information security. Frequently Asked Questions (NIST) – Learn more about how the NIST framework works and how you can […]

Offensive & Infrastructure Deployment

Offensive & Infrastructure Deployment is a term used in the context of cybersecurity to describe the process of utilizing various security tools and techniques to identify and remediate potential threats to an organization’s network infrastructure. This process involves a combination of both proactive and reactive measures, including threat analysis, security testing, and implementation of preventive […]

Scanning / Pentesting

sqlmap – sqlmap is an open source penetration testing tool that automates the process of detecting and exploiting SQL injection flaws and taking over of database servers. It comes with a powerful detection engine, many niche features for the ultimate penetration tester and a broad range of switches lasting from database fingerprinting, over data fetching […]

Forensics

Forensic analysis is a critical aspect of cybersecurity that involves the collection, preservation, and examination of digital evidence in order to identify, understand, and prevent cyber threats

Content Disarm & Reconstruct (CDR)

Content Disarm & Reconstruction (CDR) is a cybersecurity technique that sanitizes and reconstructs digital files to prevent malicious content from entering an organization’s network. This guide provides an overview of the importance of CDR and the techniques used to implement it effectively.

Scanning / Pentesting

Scanning and pentesting (also known as penetration testing) are important techniques used in cybersecurity to identify vulnerabilities and weaknesses in systems and networks. Scanning involves using automated tools to identify potential vulnerabilities in a system or network, while pentesting involves manually attempting to exploit those vulnerabilities in order to test the security of a system. […]