search
top

Podcast Episode 5 – Lets talk about Application Security

Guest Speaker: Jeevan Singh

Check out our podcast episode from any of the podcast links below:

Discussion on Application Security, AI, Bug Bounty Programs and more!

Spotify: https://open.spotify.com/show/6KP2Z46VRkl5GJ4ivbIpCl

Apple Podcasts: https://podcasts.apple.com/ca/podcast/stealthbay/id1574821334

Google Podcast: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy82MTkzMTRlYy9wb2RjYXN0L3Jzcw==

RadioPublic: https://radiopublic.com/stealthbay-6vkBo1

PocketCasts: https://pca.st/evsg4l7l

Stitcher: https://www.stitcher.com/show/stealthbay

Castbox: https://castbox.fm/channel/StealthBay-id4410602

Linux for System Administrators

Hello again everyone! This month’s post is about an awesome book I just got my hands on related to the Linux operating system.  It’s authored by both Viorel Rudareanu & Daniil Baturin. And is published by Packt, who’s got a huge line of great books and content. I’ve decided to write up a quick review of the book for anyone that interested in learning Linux or increasing their Linux OS skills.

Book Link -> https://www.packtpub.com/product/linux-for-system-administrators/9781803247946

What will this book teach me?

This is a great book for anyone that is new to Linux and would like to further their skills. Yes, it’s also great for intermediate users, who are looking for Linux best practices, as well as advanced skills such as server virtualization and Linux system security.

Read More Of This Post

Passing the GDSA exam

Recently, I challenged the GIAC/SANS GDSA exam. And I am excited to say, I passed and have obtained the GDSA certificate!

The course and exam concepts were a mix of things known to many experience cybersecurity professionals. While, at the same time, many new trending topics that a large portion of businesses are pushing towards (Zero Trust). There are many fun labs that challenge you to break into routers in very simple ways. The purpose of these types of challenges is to start thinking about of defenses that can be built to overcome weaknesses. On top of that, it sets a standard to always implement best security practices and keep them in mind for any architectural designs.

SEC530: Defensible Security Architecture and Engineering class

I had taken the full course related to this certification. If you want to read my review of the corresponding course, then check this blog post out –> https://www.stealthbay.com/sec530-defensible-security-architecture-and-engineering/

Prepping for the exam

Read More About This Post

SEC530: Defensible Security Architecture and Engineering – Zero Trust

Why take this course?

One of the major reasons on why I chose to take SEC530 is due to the class syllabus. A big item that stood out to me was learning more about implementing Zero Trust and an Insider Threat program. The course has a whole day dedicated to just those topics alone. Being in a Security Engineering role, this course is a great way to understand how to assess your current defenses within your organization. But, also allows you to plan ahead for future controls that may need to be built out over time.

If you’ve got an extensive amount of experience already working within the cyber security world. Then, some of the defenses may be items that you have already worked on or have some exposure on. For me personally, a lot of the materials from Day 1-3 were concepts and practical work that I have already experienced. However, Day 4-5 were excellent in learning new topics/ideas that will at least for me lead to fun future projects.

I took the vLive course option, which in my case was also taking place in person. So, it was a hybrid class with students in person, as well as students (such as me) taking it remotely for the week.

Day 1

The start to the course will go over many basic concepts related to best practices for physical and network security. You’ll get to play with the MITRE Framework, and understand the cyber kill chain. There is a good chunk of time dedicated to learning about various types of NetFlow data (on prem networking devices, cloud, endpoint). It’s a great start to the course to warm you up to the good stuff!

Day 2

Read More About This Post

Podcast Episode 4 – Lets talk about Defcon

Guest Speaker: Kevin Sugihara

Check out our podcast episode from any of the podcast links below:

Spotify: https://open.spotify.com/show/6KP2Z46VRkl5GJ4ivbIpCl

Apple Podcasts: https://podcasts.apple.com/ca/podcast/stealthbay/id1574821334

Google Podcast: https://www.google.com/podcasts?feed=aHR0cHM6Ly9hbmNob3IuZm0vcy82MTkzMTRlYy9wb2RjYXN0L3Jzcw==

RadioPublic: https://radiopublic.com/stealthbay-6vkBo1

PocketCasts: https://pca.st/evsg4l7l

Stitcher: https://www.stitcher.com/show/stealthbay

Castbox: https://castbox.fm/channel/StealthBay-id4410602

« Previous Entries

top