>_Cybersec.Reviews

Honest Reviews of Cybersecurity Education
Learn Today, Secure Tomorrow

Reviews Hello! Thank you for checking out my little spot on the internet. My name is Hayden and I am a cybersecurity professional who loves to learn. There is a massive amount of educational resources in the field of cybersecurity. I started reviewing content with the mission to offer non biased reviews to help students make informed decisions on their education. Scoring Review Disclaimer My goal is to provide honest and consistent reviews that can help others decide if an educational resource is right for them. More

Key Points Release Date: September 2020. Date Reviewed: June 2024. Author/Creator: Josh Mason, Alexis Ahmed. Subject(s): Network and Web Penetration Testing, Vulnerability Scanning. Prerequisite(s): Basic IT Knowledge, Intermediate Networking Knowledge, Familiarity with the Windows and Linux Command Line Medium: Video Courses, Hands on Exercises. Length: 148 Hours Training + 48 Hour Exam. Price: INE Fundamentals Plan for Training Path: $39 A Month + Exam Voucher: $200 Link: https://ine.com/ (Not Affiliated) More

SOC Analyst 101 Part 2: Analyst Mindset If you haven’t already, please read my prior SOC analysts 101 posts. From part 1 we covered the basics of security models and logs and at the end I gave you some homework to explore how to read logs. If you have not done so, I recommend checking out the resources section in part 1. At this time, you should have a decent understanding of enterprise networks, logging, and the ability to read logs. More

SOC Analyst 101 Part 1: Security Models & Logs This is part 1 of the SOC Analyst 101 blog series. If you have not, please make sure to read the previous primer post “SOC Analyst 101 Part 0: Overview & Prerequisites”. At this point you have determined that you would like to further pursue a career as a SOC Analyst. You might have gained a few certifications, made a network HomeLab, and/or worked through some other educational resources. More

Disclaimer This blog series is not representative of processes or procedures that are unique to my employer or any other company. This article series is meant to provide information that is agnostic and to educate those who aspire to be a cybersecurity analyst. Overview Purpose of This Blog The goal of this series to provide insight into working in cybersecurity (specifically an analyst role) to anyone, technically skilled or not. I was inspired to write this blog series after having many people inquire about how to get into working in the defensive side of Cybersecurity which is commonly an analyst role, which has been my first position in security. More

(Wannacry Ransomware) Note- This challenge write-up is a “blind analysis”, which was written prior to viewing the answer section of this course. I include how I answered questions, if I got it right or wrong, and why as a reflection for further learning. (Contains spoilers!) Practical Malware analysis and Triage “WannaCry” Challenge The course is available here for $30 Monthly Subscription (All Access Pass TCM Academy)- https://academy.tcm-sec.com/p/the-all-access-pass?affcode=770707_o6lvcuwx (Affiliate Link) More

Video Review Key Points Release Date: September 2021 Date Reviewed: February 2023 Author/Creator: Husky Hacks (https://huskyhacks.dev/) Subject(s): Malware Analysis, Sandbox Lab Setup, Virtual Box, Reverse Engineering, Report Writing, Static Analysis, Dynamic Analysis, Windows API, Malware Techniques, YARA Rule Writing Prerequisite(s): Familiarity With The Windows OS, Windows/Linux Command Line Experience, Basic Understanding of Programming Medium: Video Course, Hands on Exercises, Written Content Length: 9 Hours Video Content Price: $30 Monthly Subscription (All Access Pass TCM Academy) More

Summary Overview Sample Hash: d7c808bceb5752abbe1e56151e8ac382a6dd94a4ff1499d14baef362e4cf08a0 Sample Name: RuneLite Stealer Capabilitie(s): Information Stealer (RuneScape Credentials) A friend of mine came across this Reddit thread that was posted on December 15th, 2022 and shared with me that he was attempting to view what the executable was and how it works. The malware sample was a modified game client for Runescape called RuneLite. Runescape is popular online MMO game that I played a lot in middle school and investigating a possible malware sample was intriguing to me. More

Note: This challenge write-up is a “blind analysis”, which was written prior to viewing the answer section of this course. I include how I answered questions, if I got it right or wrong, and why as a reflection for further learning. (Contains spoilers!) Practical Malware analysis and Triage “Siko Mode” Challenge This write up comes from the PMAT course that was produced by Husky Hacks. At the time of writing, I am about 3/4 through the course and have found it very valuable from a SOC analyst perspective. More

Note: This challenge write-up is a “blind analysis”, which was written prior to viewing the answer section of this course. I include how I answered questions, if I got it right or wrong, and why as a reflection for further learning. (Contains spoilers!) Practical Malware Analysis and Triage “Silly Putty” Challenge This write up comes from the PMAT course that was produced by Husky Hacks. At the time of writing, I am about halfway through the course and have found it very valuable from a SOC analyst perspective. More