Category: Technical Training

Counterintelligence Awareness Toolkit

Do you have a question about how to do something or need more information about a topic? This toolkit will quickly point you to the resources for Counterintelligence Awareness. http://www.cdse.edu/toolkits/ci/index.php

Permanent link to this article: https://www.darknessgate.com/2016/09/06/counterintelligence-awareness-toolkit/

Framework for Improving Critical Infrastructure Cybersecurity

The Framework is voluntary guidance, based on existing standards, guidelines, and practices, for critical infrastructure organizations to better manage and reduce cybersecurity risk. In addition to helping organizations manage and reduce risks, it was designed to foster risk and cybersecurity management communications amongst both internal and external organizational stakeholders. https://www.nist.gov/sites/default/files/documents/cyberframework/cybersecurity-framework-021214.pdf

Permanent link to this article: https://www.darknessgate.com/2016/09/04/framework-for-improving-critical-infrastructure-cybersecurity/

eBook: Cybersecurity for Dummies

APTs have changed the world of enterprise security and how networks and organizations are attacked. These threats, and the cybercriminals behind them, are experts at remaining hidden from traditional security while exhibiting an intelligence, resiliency, and patience that has never been seen before. Controlling these threats requires multiple security disciplines working together in context. While …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/12/19/ebook-cybersecurity-for-dummies/

Spring 2014 Lectures & Videos – Offensives computer security course

This page contains all the lecture Lecture Slides and youtube videos for the Spring 2014 semester of this course. http://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/lectures.html

Permanent link to this article: https://www.darknessgate.com/2014/11/02/spring-2014-lectures-videos-offensives-computer-security-course/

Emerging Security Vulnerabilities & the Impact to Business

This informational video examines what information technology professionals and Web programmers need to know about security, what security is needed and how to implement appropriate security. The web video examines the most common security vulnerabilities, as well as which software programs are most vulnerable. The video also focuses on specific cyber attacks, such as SQL …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/10/13/emerging-security-vulnerabilities-impact-business/

Basic Steps in Forensic Analysis of Unix Systems

This Web tutorial instructs learners on forensic analysis of machines running the Unix operating system. It covers steps used for analysis and includes graphics, illustrations and references. The tutorial also provides sample Unix scripts and protocols. In addition, the materials demonstrate how to run analysis using standard Unix tools, specifically The Coroner’s Toolkit (TCT), which …

Continue reading

Permanent link to this article: https://www.darknessgate.com/2014/10/12/basic-steps-forensic-analysis-unix-systems/