back to top

passwords

Blue Team Training Roadmap

Over 90% of all cybersecurity jobs are defensive (blue team). If you want to dramatically increase the odds of getting a job, you MUST have a solid foundation in the Blue Arts. Having degrees...

UC – Golang CLI Apps

Give Brandon Keath just 30 minutes, and you'll have your first working Golang hacking tool! This Free Upskill Challenge (UC) offers a look inside the Go programming language (often called Golang) and how you can build fast...

Windows Log Analysis – SIEMless Threat Hunting

It is commonly considered that threat hunting is a more advanced skill utilized only by companies with more mature cybersecurity programs. To a certain extent, that is accurate. SMBs may have some simple firewalls...

Ransomware Analysis Basics

Let's be honest... If the criminals do everything perfectly, getting your data back after a ransomware attack is nearly impossible without their key, and getting the key means paying the ransom. Is it impossible?...