In today's rapidly evolving digital landscape, the importance of cybersecurity cannot be overstated. Threats to organizations, both large and small, are on the rise, and the consequences of security breaches can be devastating. It's no longer enough to rely solely on technical solutions; a resilient cybersecurity culture is essential. Welcome to "The Cybersecurity Culture … [Read more...] about The Cybersecurity Culture Blueprint: A Proactive Approach
Security
Applied ChatGPT for Cybersecurity
There's a lot of talk about good and bad use of ChatGPT, but in this course we will dig into using ChatGPT to do some hands on introductory SOC analyst/incident response work, starting with basic packet analysis and moving to basic reverse engineering of a piece of malware. ChatGPT will be our guide as we do simple and intermediate level Wireshark packet analysis. We will … [Read more...] about Applied ChatGPT for Cybersecurity
Cybersecurity Management and Compliance
In this course, you’ll learn about data and record management, Information security, standards and policy formation, and implementation. You’ll also explore cloud adoption frameworks and regulatory compliance frameworks. This course will take you one step closer to the Microsoft Cybersecurity Analyst Professional Certificate, which requires no degree or prior … [Read more...] about Cybersecurity Management and Compliance
Packet Sniffing with Wireshark: Create Your First Filters
This guided project, Packet Sniffing with Wireshark: Create Your First Filters, will help an intermediate security analyst who is looking to use packet sniffing with Wireshark to capture, display, and observe specific HTTP and HTTPS packets. In this 1.5-hour long project-based course, you will learn how to use Wireshark for packet sniffing; to capture and observe certain … [Read more...] about Packet Sniffing with Wireshark: Create Your First Filters
Hardening Default GKE Cluster Configurations
This is a self-paced lab that takes place in the Google Cloud console. This lab demonstrates some of the security concerns of a default GKE cluster configuration and the corresponding hardening measures to prevent multiple paths of pod escape and cluster privilege escalation … [Read more...] about Hardening Default GKE Cluster Configurations