Google Cybersecurity Professional Course

Security Audit
Conduct a security audit
Incident Report
Use the NIST Cybersecurity Framework to respond to a security incident
Linux Commands
Use Linux commands to manage file permissions
SQL Queries
Apply filters to SQL queries
Vulnerability Assessment
Conduct a vulnerability assessment based on NIST SP-800-30
Incident Handler’s Journal
Documenting of incident responses
File handling in Python
Using Python to maintain a security related file (allow-list_

How-to articles

Wazuh XDR and SIEM

Zero Cost Home Cybersecurity with WSL2 and Wazuh
Setting up Wazuh with WSL2
Improving Security Posture With Wazuh
How to use CIS on Wazuh

CTF Challenges

CTFLearn

Profile

Selective Writeups

Cryptgraphy
Programming
Reverse Engineering
Binary