A curated list of technical papers we've published are listed below - follow the links for PDF downloads:
Note: See Blog for other topic writeups that may be beneficial or sign up for classes for additional learning!
Clink on the file name to open the PDF in another window:
Topic: SMART Goals
Overview: SMART goals are specific, measurable, achievable, relevant, and time-bound objectives that provide a clear and structured approach to goal setting, ensuring that goals are both realistic and attainable within a specified timeframe.
Topic: SHODAN Overview
Overview: Shodan is a search engine that scans and indexes internet-connected devices, such as servers, webcams, and routers, providing detailed information about these devices and their vulnerabilities. It's commonly used by security professionals, researchers, and hackers to discover devices exposed on the internet and assess their security.
Topic: Rsyslog
Overview: Rsyslog is a powerful, open-source log processing tool primarily used on Unix and Unix-like systems for forwarding log messages in an IP network. It offers high-performance, great flexibility, and a modular design, allowing it to handle large volumes of messages efficiently while being able to route, filter, and transform log data based on configurable criteria.
Topic: Rsync Usage
Overview: Rsync is a fast and versatile file copying tool widely used in Unix-like systems for efficiently synchronizing files and directories across different locations, either on the same machine or between different machines over a network. It stands out for its ability to transfer only the differences between the source and the destination, thereby minimizing the amount of data sent over the network and significantly speeding up the synchronization process.
Topic: Basic Packet Analysis - Wireshark
Overview: Wireshark is a widely-used network protocol analyzer that allows users to capture and interactively browse the traffic running on a computer network. It has the capability to extract files from captured traffic, enabling users to reconstruct and analyze data transmitted over the network, such as documents, images, and other file types.
Topic: AWS Cloudtrail Logging
Overview: AWS CloudTrail is a service provided by Amazon Web Services (AWS) that logs and continuously monitors account activity related to actions across the AWS infrastructure. This service enables users to track and audit changes to AWS resources, ensuring compliance with internal policies and regulatory standards by providing a detailed record of who did what, when, and where in the AWS environment.
Topic: AWS S3 Bucket Logging and Versioning
Overview: AWS S3 Bucket Logging is a feature in Amazon Web Services that provides detailed records for requests made to an S3 bucket, allowing monitoring and auditing of data access and usage. S3 Versioning, on the other hand, is a feature that keeps multiple variants of an object in the same bucket, enabling preservation, retrieval, and restoration of every version of every object stored, thereby offering a way to recover from accidental deletions or overwrites.
Topic: AWS NACLs and Security Groups
Overview: AWS Network Access Control Lists (NACLs) are an additional layer of security for AWS VPCs that provide a stateless, numbered list of rules to allow or deny traffic at the subnet level. In contrast, Security Groups in AWS act as virtual firewalls for EC2 instances, offering stateful filtering of inbound and outbound traffic at the instance level, thus enabling more granular control over network access to and from instances.
Topic: AWS Identity and Access Management (IAM) Basics
Overview: AWS Identity and Access Management (IAM) is a service that helps manage access to AWS services and resources securely, allowing the creation and management of AWS users and groups, and the use of permissions to allow or deny their access to AWS resources. IAM enables organizations to establish and enforce user-specific access policies, including multi-factor authentication and role-based access control, ensuring that only authenticated and authorized entities can access their AWS environment.
Topic: AWS Lost SSH Key Recovery
Overview: In AWS, if you lose the SSH key for an EC2 instance, there's no direct way to recover the lost key. Here we cover how one way to do so by using EC2 User Data and EC2 Instance Connect Recovery Methods.