Posts

CYBER SECURITY STUDY PLAN

Image
                                                    CYBER SECURITY STUDY PLAN Penetration Testing Resources Metasploit Unleashed – Free Offensive Security Metasploit course. Penetration Testing Execution Standard (PTES) – Documentation designed to provide a common language and scope for performing and reporting the results of a penetration test. Open Web Application Security Project (OWASP) – Worldwide not-for-profit charitable organization focused on improving the security of especially Web-based and Application-layer software. PENTEST-WIKI – Free online security knowledge library for pentesters and researchers. Penetration Testing Framework (PTF) – Outline for performing penetration tests compiled as a general framework ...

How To File Cybercrime Complaint Online In India : Step By Step Process

Image
                                                      Cyber crime Complaint Online In India This is how you can lodge an online complaint about cyber crimes God forbid, but if you are a victim of such fraud. The very first step is to open the website –   https://cybercrime.gov.in/ Step 1 – As you open the website, you will see the following prompt on your screen. You can notice, next to the home button tab, there are two other options – Report Women/Child-Related Crime and Report Other Cyber Crime. Step 2- If a woman or a child is a victim of cyber crime, then you can click this button. Upon clicking, you will find an option of Report anonymously and report & track. If you want to hide your identity then the ...
      Domain 1 Emphasize Ethics Emphasize authenticity and nonrepudiation (properties of Integrity) Change “ global ” context to “ holistic ” context (legal and regulatory requirements) Move Investigation types here from Domain 7 Change SCA to Control assessments (security and privacy) Remove Asset valuation from risk management Mention Risk maturity modeling Use the term, Supply Chain Risk Management (SCRM) Mention social engineering, phishing, security champions , and gamification Domain 2 Use the term, asset handling requirements Move Provision resources securely here from Domain 7 Specify data lifecycle Emphasize asset retention (EOL, EOS) Identify Data protection methods Move Digital Rights Management (DRM) here from Domani 3 Domain 3 Specify secure design principles Identify 15 (add 7 more) vulnerabilities of architectures, designs, and solution elements. ( Microservices , Containerization , Serverless , High-Performance Computing systems , Edge computing s...
 Url analysis tools:  https://www.virustotal.com/gui/ https://www.urlvoid.com/ https://urlscan.io/ https://exchange.xforce.ibmcloud.com/ https://zulu.zscaler.com/ https://umbrella.cisco.com/ https://www.hybrid-analysis.com/ IP analysis tools: https://exchange.xforce.ibmcloud.com/ https://www.ipvoid.com/ https://umbrella.cisco.com/ More info about IP and URL (created date,location,org )can check on : http://cqcounter.com/whois/ http://domainwhitepages.com/ http://whois.domaintools.com/

Cyber Security Interview Preparations Part 2

Image
If You’re Studying For The CISSP, Watch These Movies   I knew if I wanted to pass the CISSP the first time, I’d need to eat, sleep, dream, breathe the CISSP. Studying for the CISSP became a strong part of my everyday thinking.  I’d wake up thinking about DRP/BCP, and I’d go to sleep thinking about Mandatory Access Control. When spending some quality time with my wife watching movies, I’d start to notice helpful CISSP concepts in some movies. “Hey, I’m studying that for the CISSP!” I’d say. Here’s a list of movies (and some TV shows) that incorporate aspects of the CISSP, and helps you relate to some practical use of concepts. If you have any suggestion, let me know and I’ll update the list! Security and Risk Management Breach – Robert Hanssen worked for the FBI and was a double agent for Soviet and Russian Intelligence.  Hanssen had a high security clearance, and had need-to-know access to a treasure of highly classified files.  A...
CISSP The Easy Way: A 30 Day Plan Like many of my InfoSec brethren, I am bored to tears with news of the “IT security skills gap.” There are far too many intelligent and hardworking people left on the sidelines because they don’t have the exact right mix of certifications, education, and experience for us to be talking about a skills gap. But I’m not one to complain. Like it or not, InfoSec hiring managers, recruiters, and HR professionals love certifications. So I’m going to show you how to get them! This study guide is the first in a series of guides I plan to write about how to prepare for information security exams. I’m starting with the Certified Information Systems Security Professional (CISSP) study guide since it is the most recognized Information security exam. This exam prep guide consists of four phases: plan, review, practice, test. In the following sections, I’ll provide a brief overview of what’s done in each phase. This guide is aimed primarily at...