CyberSecurity part 24
Functional Programming in Coq
Staying on the theme of programming and cybersecurity, this course is about Functional Programming in Coq and was mentioned on the Libreplanet discuss mailing list. It may be useful generally as a way to learn skills that can be applied to other languages or just generally.
#CyberSecurity,#Coding,#Functional,#Programming,#COQ
CyberSecurity part 23
Courses and further reading:-
Courses related to Kali Linux
Learning how to use these and the associated tools is way beyond the scope of what I am doing here. I would therefore suggest you look in to other learning options.
There are many other providers, not sure about any in Torbay, we do seem to be in the dark ages down here. But Tech Learning Collective do several courses.
Tech Learning Collective
I have listed some providers below, and would hope that the forum may, eventually be a good source of information too.
Links
Cyber Security
Tags
#CyberSecurity,#Courses.
CyberSecurity part 22
Penetration testing and cyber security tools
I am sharing a link to a Kali Linux cheat sheet, This is a pdf with a long list of tools etc, and there are links to each one for more information. I
Links
* Kali Linux
* Kali Linux Cheat Sheet
* login link
Tags
#CyberSecurity,#PenTestingTools
CyberSecurity part 21
Python, is a very useful and powerful programming language which can be used for a wide variety of tasks, including those relating networking and cybersecurity, pen testing etc. Therefore having a good knowledge will be very beneficial going forward. To this end there are a few links below.
Python is also pre-installed on the Raspberry Pi, however you can also experiment via Replit. FreeCodeCamp have a number of python courses, one or two are related to cybersecurity. Vfsync which we are using as a virtual GNU / Linux machine, comes with Python 2.7 and Python 3.8.3
localhost:~$ python
Python 2.7.18 (default, Apr 21 2020, 01:56:54)
[GCC 9.3.0] on linux2
Type "help", "copyright", "credits" or "license" for more information.
>>>
Links
Tags
#CyberSecurity,#Python
CyberSecurity part 20
Over the past 20 days, we have covered a wide range of topics. Given that we are heading towards discussing cyber security, then it is time we started to look at the legal framework behind this.
The United Kingdom has a piece of legislation called the Computer Misuse act, that was introduced in 1990. There is a video below about this.
I am sharing so that it is clear that what you learn and undertake with systems such as Kali Linux has to be within the law.
Links
Tags
#CyberSecurity,#ComputerMisuseAct
CyberSecurity part 19
Today, we are looking at virtual machines, and the video even mentions Kali Linux, which is one of the pentesting distributions we will be looking at later on.
Links
Tags
#CyberSecurity,#VirtualMachines
CyberSecurity part 18
Today I am posting another video, this time on Git / Github, and yes I fully acknowledge there are alternatives to github. I have provided links to various git repository solutions.
This is another important topic.
Links
Tags
#CyberSecurity,#Git,#Github,#Repositories
CyberSecurity part 16
No actual content today, so take the day off, and perhaps review what you have done so far. Well done for sticking with this.
Links
Tags
#CyberSecurity,
CyberSecurity part 17
SSH or Secure shell, allows a user to remotely login to another computer. This can be achieved using the OpenSSH server software. The video below is a beginners guide to this.
Hopefully it covers enough so that people understand the basics. I find ssh useful when I am running a raspberry pi headless (without a monitor) and need to gain access via my desktop.
Links
Tags
#CyberSecurity,#ssh,#OpenSSh
CyberSecurity part 15
As this series is going to eventually get to looking at cybersecurity, it would be a good idea to learn about networking concepts. This video seems good at explaining some of this. In fact, it also covers firewalls, which I had planned for a later post.
I have also added links to details of common network ports and their associated services.
What is:
- a switch
- router
- gateway
- subnet
- gateway
- firewall
- DMZ
Links
Tags
#CyberSecurity,#Networking,#Ports,#Switch,#Subnet,#IP,'#Gateway,#Firewall,#DMZ,#Router,#Ports