Juan Miguel Cano
October 9, 2023
This is my ops reading notes
- Case Study: China’s Spy Chip
- Build a Computer
- What is the BIOS
- Installing Ubuntu Linux
- Installing Virtualbox with Linux Terminal
- SOHO Networking
- Network Connectivity
- Virtualization of Windows OS
- Command Line Interface
- Metocognative Map
- Dev Tools
- Issue tracking system
- Troubleshooting Techniques
- Windows Command Line Tools
- Windows Security Center
- OS Upgrade and Remote Access
- System Log analysis,Registry,ControlPanel
- Workstation Deployment SOP
- Imaging,Backup, and Recovery
- Data Restoration, Startup Repair, and Secure Disposal
- Virtualizing a Router with pfSense
- Importance of Virtualization in the Amazon EC2 Cloud
- Malware Remediation Tools and Techniques
November 27, 2023
- Readings: Network Traffic Analysis with Wireshark
- Network scanning with NMAP
- Network Segmentation
- Routing
- VPN Tunnel
- Network Address Translation
- Web Server Deployment
- RADIUS Authentication
- Command Line Interface
- VPC
- Windows Server
- Domain Controller
- Active Directory
- Group Policy
January 08, 2024
- Growth Mindset
- Strategic Policy & Development
- Cloud Security Principles and Framework
- Cyber Risk Analysis
- Systems Hardening with CIS Standards
- Encryption
- Data File Encryption and Hashing
- Protecting Data at Rest
- Data Loss Prevention and Data Classification
- Public Key & Infrastructure
- Advanced Event Logging
- Foundational SIEM Operations
- Log Analysis with Splunk
- Reconstructing a Cloud Attack Using Log Data
- Intrusion Detection & Prevention Systems IDS/IPS
- Brute Force Attacks
- Cloud Identity and Access Management (IAM) with AWS
- Cloud Network Security
- Cloud Logging and Monitoring
- Cloud Detective Controls, Guard Duty
- Malware Detection with YARA Rules
- Maleware Traffic Analysis with WireShark
- Threat Hunting with Security Onion
- Threat Hunting with Zeek, RITA
- Forensic Investigations with Autopsy
- Web Vulnerability Scanning with Nmap
- XSS with w3af, DVWA
- Automated AppSec with OWASP ZAP
- Attacking Juice Shop with Burp Suite
- SQLi with Burp Suite, Web Goat
- Vulnerability Scanning with Nessus