Home - Paiet/Tech-Journal-for-Everything GitHub Wiki
Welcome to the Tech-Journal-for-Everything's Wiki!
Cool Stuff:
- Vulnerability Management
- Common Vulnerabilities
- Compensating Controls and Architecture
- Identity and Access Management (IAM)
- Scan Results Verification
- Forensics Toolkit
- Forensic Suites and Utilities
- Incident Response Plan
- Indicator of Compromise: Network Symptoms
- Recovery and Post Incident Response
- Security Architectures and Toolsets
- Security Tools and Technologies
- CSIRT Roles and Communication
- Software Development Security
- VPN Types
Networking Stuff:
- Unified Communication Technologies
- technologies that support cloud and virtualization
- implement a basic network
- IPv4 Subnetting
- WAN technologies
- IP Addressing
- How to install and properly terminate various cable types and connectors
- network infrastructure implementations
- routing concepts and protocols
- monitoring tools
- resources to support configuration management
- implementing network segmentation
- install and apply patches and updates
- configure a switch using proper features
- risk related concepts
- network vulnerabilities and threats
- implement network hardening techniques
- physical security controls
- install and configure a basic firewall
- purpose of various network access control models
- basic forensic concepts
- implement the following network troubleshooting methodology
- analyze and interpret the output of troubleshooting tools
- troubleshoot and resolve common wireless issues
- troubleshoot and resolve common copper cable issues
- troubleshoot and resolve common fiber cable issues
- troubleshoot and resolve common network issues
- troubleshoot and resolve common security issues
- troubleshoot and resolve common WAN issues
- Analyze a scenario and determine the corresponding OSI layer
- Given a scenario, configure and apply the appropriate ports and protocols
- Basics of network theory and concepts
- Given a scenario, deploy the appropriate wireless standard
- Given a scenario, deploy the appropriate wired connectivity standard
- Given a scenario, implement the appropriate policies or procedures
- Given a scenario, install and configure equipment in the appropriate location using best practices
- Basics of change management procedures
- Ports and Protocols
Security Stuff:
- Components used to create a secure network design
- Mitigation and Deterrents
- Network Administration Principles
- Physical Security & Awareness
- Security Risk
- Risk Management & Incident Response
- Securing Network Devices
- Social Engineering Attacks
- Types of Malware.
- Types of Wireless Attacks
- Types of Attacks
App Security:
Linux
Linux - Starting CLI:
Linux Shell Commands:
Linux Shell Commands Plus:
Linux - Installing Software:
Linux - Editing Files:
Linux - Writing Simple Shell Scripts:
Linux Security:
Installing Configuring OpenVPN in Linux
Linux Administration Task:
Linux Networking:
- Configuring a Network Adapter
- Troubleshooting Networking
- Troubleshooting Application Networking
- Managing Name Resolution
PowerShell: Syntax
- PowerShell Basics
- PowerShell: Basic Functions
- PowerShell Command History and Aliases
- PowerShell: Drives
- PowerShell: Module Basics
- PowerShell: Piping and Formatting
- PowerShell: Profiles
- PowerShell: Script Execution Policy