Paul Sutton

Cybersecurity

CyberSecurity part 24

Functional Programming in Coq

Staying on the theme of programming and cybersecurity, this course is about Functional Programming in Coq and was mentioned on the Libreplanet discuss mailing list. It may be useful generally as a way to learn skills that can be applied to other languages or just generally.

#CyberSecurity,#Coding,#Functional,#Programming,#COQ

CyberSecurity part 23

Courses and further reading:-

courses Courses related to Kali Linux

Learning how to use these and the associated tools is way beyond the scope of what I am doing here. I would therefore suggest you look in to other learning options.

There are many other providers, not sure about any in Torbay, we do seem to be in the dark ages down here. But Tech Learning Collective do several courses.

Tech Learning Collective

I have listed some providers below, and would hope that the forum may, eventually be a good source of information too.

Links

Cyber Security

Tags

#CyberSecurity,#Courses.

CyberSecurity part 22

Penetration testing and cyber security tools

I am sharing a link to a Kali Linux cheat sheet, This is a pdf with a long list of tools etc, and there are links to each one for more information. I

Links * Kali Linux * Kali Linux Cheat Sheet * login link

Tags

#CyberSecurity,#PenTestingTools

CyberSecurity part 21

Python, is a very useful and powerful programming language which can be used for a wide variety of tasks, including those relating networking and cybersecurity, pen testing etc. Therefore having a good knowledge will be very beneficial going forward. To this end there are a few links below.

Python is also pre-installed on the Raspberry Pi, however you can also experiment via Replit. FreeCodeCamp have a number of python courses, one or two are related to cybersecurity. Vfsync which we are using as a virtual GNU / Linux machine, comes with Python 2.7 and Python 3.8.3

localhost:~$ python
Python 2.7.18 (default, Apr 21 2020, 01:56:54)
[GCC 9.3.0] on linux2
Type "help", "copyright", "credits" or "license" for more information.
>>>

Links

Tags

#CyberSecurity,#Python

CyberSecurity part 20

Over the past 20 days, we have covered a wide range of topics. Given that we are heading towards discussing cyber security, then it is time we started to look at the legal framework behind this.

The United Kingdom has a piece of legislation called the Computer Misuse act, that was introduced in 1990. There is a video below about this.

I am sharing so that it is clear that what you learn and undertake with systems such as Kali Linux has to be within the law.

Links

Tags

#CyberSecurity,#ComputerMisuseAct

CyberSecurity part 19

Today, we are looking at virtual machines, and the video even mentions Kali Linux, which is one of the pentesting distributions we will be looking at later on.

Links

Tags

#CyberSecurity,#VirtualMachines

CyberSecurity part 18

Today I am posting another video, this time on Git / Github, and yes I fully acknowledge there are alternatives to github. I have provided links to various git repository solutions.

This is another important topic.
Links

Tags

#CyberSecurity,#Git,#Github,#Repositories

CyberSecurity part 16

No actual content today, so take the day off, and perhaps review what you have done so far. Well done for sticking with this.

Links

Tags

#CyberSecurity,

CyberSecurity part 17

SSH or Secure shell, allows a user to remotely login to another computer. This can be achieved using the OpenSSH server software. The video below is a beginners guide to this.

Hopefully it covers enough so that people understand the basics. I find ssh useful when I am running a raspberry pi headless (without a monitor) and need to gain access via my desktop.

Links

Tags

#CyberSecurity,#ssh,#OpenSSh

CyberSecurity part 15

As this series is going to eventually get to looking at cybersecurity, it would be a good idea to learn about networking concepts. This video seems good at explaining some of this. In fact, it also covers firewalls, which I had planned for a later post.

I have also added links to details of common network ports and their associated services.

What is:

  • a switch
  • router
  • gateway
  • subnet
  • gateway
  • firewall
  • DMZ

Links

Tags

#CyberSecurity,#Networking,#Ports,#Switch,#Subnet,#IP,'#Gateway,#Firewall,#DMZ,#Router,#Ports