Practical Cyber Security
Practical cyber security controls that anyone can immediate apply to secure his/her cyber space against real and contemporary cyber attacks. Providing action oriented, relevant and feasible skills to protect individual and organisation from most important cyber attacks instead of tempting to solve all imaginary problems.
7. Ethical Hacking - Metasploit Framework Part 2
6. Ethical Hacking - Metasploit Framework Part 1
Kali Linux (Nmap) - Network, Host, Service Enumeration
Ethical Hacking/Penetration testing Lab
Kali Linux - Ethical hacking stage practical demonstration
Kali Linux Overview
Finalizing security onion installation
SOC Analyst Introduction - Security Onion
Introduction to ethical hacking
Elastic using Logstash for Custom Application Logs Collection
Account & Access Control
Automated Secure Configurations - CIS Benchmarks
Implementing Secure configuration using CIS benchmarks
5. Cyber security control - Secure Configurations
4. Cyber security control - Data Protection
Elastic Stack - Centralized Audit Log Management
Elastic Osquery Introduction - Saved query and Packs
Elastic Osquery Introduction - Inventory Use Case
Elastic Stack - Integrations
Elastic Stack - Enroll Agent to Fleet
Elastic Stack - Introduction
3 Practical cyber security controls - audit log management
2 Practical cyber security controls - inventory of software
1 Practical cyber security controls - inventory of hardware
0. Practical cyber security controls - introduction