Cyber Security

Thursday, May 16, 2019

Network Segmentation Plan Part-1

›
Background Network Segmentation (1) Benefits: Improved Security : Network traffic can be isolated and/or filtered to limit and/or preven...
33 comments:
Wednesday, June 20, 2018

YAML Fundamentals

›
Notes All Ansible playbooks are written in YAML. YAML - is a data structure format. The # precedes all comments. All YAML files can opt...
4 comments:
Wednesday, May 2, 2018

The Best Online Tech Courses Available

›
Disclaimer: I am not a employee of any of the online course platforms mentioned nor an I sponsored by any of the instructors who course(s) ...
7 comments:
Wednesday, January 10, 2018

How To Stay Healthy While Fighting Cyber Crime

›
Disclaimer : I am not a doctor. Please be aware of any food allergies you might have and take precautions to avoid them.  I am not endorsed...
9 comments:
Sunday, August 13, 2017

Forensics: Imaging a Drive

›
Background   This blog post will cover how to image a hard drive(s) of a workstation/desktop computer. The process for imaging a large ...
1 comment:
Wednesday, June 7, 2017

OSINT: Nmap

›
Disclaimer Do NOT preform network scans on networks without prior authorization. Download Nmap for Windows Nmap for Linux Background...
2 comments:
Monday, March 20, 2017

Cyber Security Analyst (Part 3 of 3)

›
Writing Snort Signatures This series will cover analyzing the common data types found in cyber security incidents; Netflow,  Domain(s) ...
30 comments:
›
Home
View web version

About Me

My photo
bdavis
I have 7+ years of experience in the field of cyber security performing the functions of OSINT, Network Monitoring, Policy & Procedure writings, and Infrastructure architecture.
View my complete profile
Powered by Blogger.