Blog
Learn about CSNP, Cyber Safety, technical cybersecurity, and careers in security from our members and volunteers. Interested in contributing?
The SIEM Playbook: Strategies for Preventing Brute Force Cybersecurity Breaches
Let’s build a Cloud Network - 02: Internet Gateway and Route Tables
Threat Hunting Metrics: The Good, The Bad and The Ugly
Let’s build a Cloud Network- 01: VPC and Subnets
Unraveling the Where: A Deep Dive into Geolocation (GEOINT) for OSINT
Build a Threat Hunting Lab. Installing and Configuring Elasticsearch and Kibana
How to Use the Ransomware Control Matrix: A Step-by-Step Guide
Brace for Impacket!
The Defender’s Guide to Windows Services
Threat Hunting Series: Detection Engineering VS Threat Hunting
The Defender’s Guide to the Windows Registry It’s dangerous to defend the registry alone! Take this!
Catching a Wev(tutil): Threat Detection for the Rest of Us
Threat Hunting Series: Using Threat Emulation for Threat Hunting
SECURITY TOOLS FOR A CYBERSECURITY PROFESSIONAL
Sticky Fingers in the Honey Pot
Encryption and the CIA Triad
Relapse of LAPSUS$: A Cyber Threat Intelligence Case Study
Threat Hunting Series: What Makes a Good Threat Hunter
Threat Hunting Series: The Basics
Wireshark: A Forensic Investigation