What is the Right Role for me?

There are a lot of different fields within cybersecurity. How do you know which one is right for you. Many people will tell you this is one of the first steps to do. It is important in order to apply for the right jobs for you. SANS has created a tool to help identify what roles would be right for you and define where your strengths are. Here is a sample of what mine looks like:

My top competencies
My recommended focus areas

Weekly Cybersecurity Wrap-up 3/6/23

Webinars

Articles

Podcasts

  • Security Now 912 – The NSA @ Home – Hosted by Steve Gibson, Leo Laporte LastPass hack details, Signal says no to UK, more PyPI troubles, QNAP bug bounty
  • Smashing Security 311 – TikTok, wiretapping, and your deepfake voice is your password
  • Security Now 913 – A Fowl Incident, Hosted by Steve Gibson, Leo Laporte, DDoS’ing Fosstodon, Strategic Objective 3.3, CISA’s Covert Red-Team

Projects

Splunk – Using Fields

Weekly Cybersecurity Wrap-up 2/27/23

Webinars

  • ChatGPT – good or evil? AI impact on cybersecurity – the business community is concerned about the AI’s potential to change the game for cyber criminals and wreak havoc in the world of defense organizations. Should businesses soon expect a wave of even more advanced cyber-attacks or simply more attacks? Will current cybersecurity solutions be enough? Or will ChatGPT instead provide cybersecurity specialists with more efficient and smarter defensive and threat hunting tools?
  • Splunk Training – As part of its $100 million Splunk Pledge, Splunk has committed to supporting nonprofit organizations that provide skills training to individuals from communities that have been traditionally underrepresented in the technology industry. It is our hope that the Splunk training you receive through WSC helps prepare you for a successful career in our increasingly data-driven economy.

Articles

Podcasts

Projects

Splunk – Pursuing Splunk Certified User Certificate

  • Completed What is Splunk Training
  • Completed Intro to Splunk Training

Pluralsight – Introduction to Information Security (2:53)

Weekly Cybersecurity Wrap-up 2/20/23

Articles

Projects

TryHackMe – Working Through SOC Level 1 path, Pyramid of Pain and Cyber Kill Chain are my most recent completions.

Cybersecurity Podcasts

Last month John on Mastodon asked what podcast people were listening to. I jumped in with my list, but I learned of a lot more out there then I was aware of. Being a big podcast fan this is one of the first mediums I turned to myself when looking for information about cyber security. Since replying to that post I have built a longer list of podcasts that I listen to and podcast that I want to listen to.

Podcast I listen to

  • Security Now – I have listened to this program for a long time. It is a weekly show that goes over the news and answers listener questions. It is part of the TWIT family of podcasts. I reccomend checking the rest of their podcasts out if you are into technology. They are wonderfully produced. This podcast is on the longer side, usually around 1.5 to 2 hours.
  • Smashing Security – This is also a weekly podcast, but has an emphasis on funny. They cover the wild part of security. The stories are always funny! This is a shorter podcast, usually under an hour. I never miss this one.
  • Risky Business – I haven’t listened to many episodes of this podcast, but I have enjoyed those I have caught. I hope to listen to many more soon.
  • Darknet Diaries – These episodes go very deep. The story telling is simply magnificent. If you only have time for one podcast in cybersecurity make it this one.
  • Paul’s Security Weekly – A quick weekly roundup of what is going on in cyber security.
  • Malicious Life – Great episodes that I found gripping. I loved the episode on SIM-swapping.
  • Hacking Humans – I’ve only caught one of these so far, I’m looking forward to listening to more though.

Podcast I have not yet listened to

Book Review | Countdown to Zero Day

Countdown to Zero Day: Stuxnet and the Launch of the World’s First Digital Weapon
by Kim Zetter

The Book in Three Sentences

  1. The first cyber war attack by the US targeting centrifuges in Iran.
  2. This was the first attack, but it is seen as only the beginning and shows that many systems all over the world are in danger of being exploited.
  3. Real physical destruction can be caused by a malicious computer code.

Impressions

This book is not the first cyber security book I’ve read. The story telling was done well, if a little long winded, like many non-fiction books I think this book could have been condensed further. At times it read as though the author was trying to make an article into a book, but at 400 plus pages, I think there was too much repetitive content. Nonetheless, this was an interesting book and covers a pivotal part of cyber history. Stuxnet is mentioned and discussed in many of the virtual training classes I have been taking in the last few months.

Who Should Read It

I think there are two categories of people who would be interested in this book. One being history people. I fit in this category as well. This was such a pivotal part of how technology is changing modern warfare that it can’t be ignored.

The second group that will be interested in this book are those with an interest in computers especially information security folks. This is the first virus designed specifically to target a very niche device. It was purposely written to attack, just that device to accomplish political goals.

My Takeaways

  • It made me aware that governments can leverage malicious code to attack each other, minimizing human loss
  • I learned that governments is keeping zero days to themselves in order to carry out attacks against their enemies

PiHole

The purpose of this project was to get a deeper understanding of DNS and networking. It also helped with many unix commands.

What is a PiHole?

The Pi-hole is a DNS sinkhole that protects your devices from unwanted content, without installing any client-side software. It can be installed as a docker component or on a raspberry pi.

I had a old raspberry pi sitting around that I had configured for the kids as a retropi, but they were not using it so I decided to do this project to learn something as well as increase the privacy of the entire house. Since getting people to be secure is hard, I’m trying instead to keep the place that they do most of their internet browsing to be more secure.

How to set up a PiHole

I primary used this video and the documentation that they put together. It worked without issue.

How to Create a PiHole

This was a fun and education project because not only did I learn more about DNS. I got to play with setting up DHCP reservations, customizing my DNS servers on the DHCP server. I also never attached the raspberry pi to a monitor or keyboard, I used SSH to connect to it and do all the operations for this tutorial.

I highly recommend this project for fun and for a chance to educate yourself with a hands on project! After setting this all up I learned that my smart TV (Samsung) was sending out 7k request an hour. I wasn’t even using the smart features! We have a AppleTV hooked up to the TV so I just unplugged the Ethernet cable on our TV. It is amazing and surprising to see what request are flowing across your network.

Weekly Cyber Security Wrap-up 2/13

Articles

Podcasts

  • Smashing Security – 308: Jail after VPN fail, criminal messaging apps, and wolf-crying watches
  • Security Now 910 – Malicious ChatGPT Use, Google Security Key Giveaway, OTPAuth

Projects

TryHackMe – I paid for premium access and completed the Introduction to Cybersecurity and Pre Security learning paths.

PiHole – I used this great tutorial to create a PiHole.

Weekly Cybersecurity Wrap-Up – 2/6/23

Webinars

Articles

Podcasts

  • Chat-GPT Seinfeld, QNAP, Google FI, Headcrab, Banner, GoodRx, Oracle, & GoAnywhere – SWN #271 – Security News Doug Chides: Chat-GPT, QNAP, Google FI, REDIS, Headcrab, Banner, GoodRx, Oracle, GoAnywhere, & more!
  • Malicious Life 206 – The (Other) Problem with NFTs
  • Smashing Security 307: ChatGPT and the Minister for Foreign Affairs
  • Security Now 909 – How ESXi Fell – EU Internet Surveillance, QNAP returns, .DEV is always HTTPS

Projects

TryHackMe – Completed the “Walking and Application Room”

PluralSight Learning

Risk Management and Information Systems Control: Risk and Control Monitoring and Reporting – 48m – Addresses the risk management lifecycle.