Josh Brade

Defensive Linux Security Tooling

Here’s a curated list of must-have Linux defensive security tools that should be an integral part of your cybersecurity toolkit (yes, pun fully intended!). Whether you’re defending against attacks, monitoring system integrity, or ensuring robust access control, these tools will equip you with the essential capabilities to harden your systems and safeguard against potential threats.… Continue reading Defensive Linux Security Tooling

Linux PS Command

The ps command serves as an essential security monitoring tool in Linux systems by providing detailed process visibility. It use can be leveraged to examine running processes, detect anomalies, and identify potential threats. The command reveals critical process attributes including user ownership, CPU/memory consumption, and process hierarchies – enabling rapid detection of privilege escalation attempts,… Continue reading Linux PS Command

OSI Model & Cybersecurity

1. Physical Layer (Layer 1) 2. Data Link Layer (Layer 2) 3. Network Layer (Layer 3) 4. Transport Layer (Layer 4) 5. Session Layer (Layer 5) 6. Presentation Layer (Layer 6) 7. Application Layer (Layer 7) Summary The OSI model helps categorize cybersecurity threats and identify at which layer they occur. It also guides implementing… Continue reading OSI Model & Cybersecurity

Asymmetric VS Symmetric Encryption

I had an interview today, and I felt I wasn’t as prepared as I should have been. A technical question came up, and I completely blanked. It really shook me and worsened the impostor syndrome I already struggle with daily. To make matters worse, HR didn’t send me the meeting link until an hour before… Continue reading Asymmetric VS Symmetric Encryption

Linux Commands Security Professionals Should Know

User and Group Management Package Manager Network Configuration & Monitoring Process Management File and Directory Management File Viewing and Editing System Information Permission Commands

A Few Cybersecurity Linux Tools to Explore

Information Gathering & Reconnaissance Vulnerability Analysis & Exploitation Wireless & Network Attacks Forensics & Post-Exploitation Password & Hash Attacks Malware Analysis, Vulnerability Research, & Incident Response

WINGET – Updating Installed Software on Windows

Let’s ensure your installed software stays up-to-date! We’ll use the Windows Package Manager to quickly find and apply any available updates. Follow the steps below to run the necessary commands using an elevated Command Prompt. Open Command Prompt as Administrator List Available Software Updates Install All Available Updates

Network Adapters in Windows – A Shortcut Story

Microsoft’s constantly evolving layouts can be a bit frustrating, making it tricky to locate settings at times. One of these pesky settings, now requiring a bit of a runaround, is accessing Network Adapters in both Windows 10 and 11. But fear not! Here’s a quick tip to swiftly navigate to the network adapters and put… Continue reading Network Adapters in Windows – A Shortcut Story

Adobe Acrobat Is Scanning Your Documents

The generative AI features in Adobe Acrobat are scanning your documents! This could possible lead to sensitive data leakage. You can turn this feature off through the windows registry. “Go to Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Adobe\Adobe Acrobat\DC\FeatureLockDown create a new dword key under feature lockdown, bEnableGentech 1 will enable the feature, 0 will disable the feature and remove all… Continue reading Adobe Acrobat Is Scanning Your Documents

Starting a Journey through Cybersecurity: A Roadmap

Embark on your cybersecurity journey with this well-rounded curriculum. These courses and learning paths equip you with fundamental knowledge and hands-on skills essential in the cybersecurity landscape. By completing these certifications, you’ll be well on your way to becoming a capable and well-rounded cybersecurity professional. Remember, continuous learning and practical application are key in this… Continue reading Starting a Journey through Cybersecurity: A Roadmap