Josh Brade

OSI Model & Cybersecurity

1. Physical Layer (Layer 1) 2. Data Link Layer (Layer 2) 3. Network Layer (Layer 3) 4. Transport Layer (Layer 4) 5. Session Layer (Layer 5) 6. Presentation Layer (Layer 6) 7. Application Layer (Layer 7) Summary The OSI model helps categorize cybersecurity threats and identify at which layer they occur. It also guides implementing… Continue reading OSI Model & Cybersecurity

Asymmetric VS Symmetric Encryption

I had an interview today, and I felt I wasn’t as prepared as I should have been. A technical question came up, and I completely blanked. It really shook me and worsened the impostor syndrome I already struggle with daily. To make matters worse, HR didn’t send me the meeting link until an hour before… Continue reading Asymmetric VS Symmetric Encryption

Linux Commands Security Professionals Should Know

User and Group Management Package Manager Network Configuration & Monitoring Process Management File and Directory Management File Viewing and Editing System Information Permission Commands

A Few Cybersecurity Linux Tools to Explore

Information Gathering & Reconnaissance Vulnerability Analysis & Exploitation Wireless & Network Attacks Forensics & Post-Exploitation Password & Hash Attacks Malware Analysis, Vulnerability Research, & Incident Response

Adobe Acrobat Is Scanning Your Documents

The generative AI features in Adobe Acrobat are scanning your documents! This could possible lead to sensitive data leakage. You can turn this feature off through the windows registry. “Go to Computer\HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Adobe\Adobe Acrobat\DC\FeatureLockDown create a new dword key under feature lockdown, bEnableGentech 1 will enable the feature, 0 will disable the feature and remove all… Continue reading Adobe Acrobat Is Scanning Your Documents

Starting a Journey through Cybersecurity: A Roadmap

Embark on your cybersecurity journey with this well-rounded curriculum. These courses and learning paths equip you with fundamental knowledge and hands-on skills essential in the cybersecurity landscape. By completing these certifications, you’ll be well on your way to becoming a capable and well-rounded cybersecurity professional. Remember, continuous learning and practical application are key in this… Continue reading Starting a Journey through Cybersecurity: A Roadmap

Two Free Cybersecurity Training Platforms

Empowering Cybersecurity Enthusiasts In the dynamic landscape of cybersecurity, knowledge and skills are the armor that shields against digital threats. SecurityBlue Team and AntiSyphon Training, both dedicated to bolstering cyber defense proficiency, offer an invaluable opportunity to harness expertise in this critical field. Let’s dive into a comprehensive exploration of these two remarkable platforms that… Continue reading Two Free Cybersecurity Training Platforms