Blue Team Code Fortification Hacking 101

HTTPS on Kubernetes with Spring Boot, Istio and Cert Manager

In this article, you will learn how to create secure HTTPS gateways on Kubernetes. We will use Cert Manager to generate TLS/SSL certificates. With Istio we can create secure HTTPS gateways and expose them outside a Kubernetes cluster. Our test application is built on top of Spring Boot. We will consider two different ways of […]

Blue Team

Cyber Security Analyst Learning Path

Lesson 1: Explaining the Importance of Security Controls and Security Intelligence Topic 1A: Identify Security Control Types Review Activity: Security Control Types Topic 1B: Explain the Importance of Threat Data and Intelligence Review Activity: Threat Data and Intelligence Lesson 1: Practice Questions Lesson 1 PBQ: Explaining the Importance of Security Controls and Security Intelligence https://hack.technoherder.com/cybersecurity-control/ […]

Blue Team

Analyze Endpoint Monitoring Output

OBJECTIVES COVERED Given a scenario, analyze data as part of security monitoring activities. Given a scenario, implement configuration changes to existing controls to improve security. Network-based monitoring systems can be supplemented with host-based monitoring. While host-based detection methods can also rely on signature-based matching, behavioral analytics is increasingly important to cybersecurity. As an analyst, you […]