Google Cybersecurity Professional Course
- Security Audit
- Conduct a security audit
- Incident Report
- Use the NIST Cybersecurity Framework to respond to a security incident
- Linux Commands
- Use Linux commands to manage file permissions
- SQL Queries
- Apply filters to SQL queries
- Vulnerability Assessment
- Conduct a vulnerability assessment based on NIST SP-800-30
- Incident Handler’s Journal
- Documenting of incident responses
- File handling in Python
- Using Python to maintain a security related file (allow-list_
How-to articles
Wazuh XDR and SIEM
- Zero Cost Home Cybersecurity with WSL2 and Wazuh
- Setting up Wazuh with WSL2
- Improving Security Posture With Wazuh
- How to use CIS on Wazuh
CTF Challenges
CTFLearn
Selective Writeups
- Cryptgraphy
- Tone Dialing: Solved 08/16/2023
- Substitution Cipher: Solved 08/24/2024
- RSA Beginner: Solved 08/25/2024
- Programming
- Programming A Language: Solved 08/16/2023
- AndhraPradesh: Solved 08/17/2023
- Impossible Equation: Solved 08/18/2023
- Reverse Engineering
- Reykjavik: Solved 08/18/2023
- Binary
- Leak me: solved 08/22/2023