Goal For This Post Hello everyone! Today I’m back and I’m going to walkthrough how I create and spin up my Kubernetes environment at home. This is a great way to get hands on with various different...
Validating Vmware Security
VMWare Vuln Check Hello! And welcome back to my blog, today we’re going to be exploring something a little different; which is the topic of cybersecurity governance and cybersecurtiy vulnerability ...
Ingesting Host Logs
Host Log Ingestion Hello! The topic of today’s discussion is host log ingestion. Specifically enterprise host log ingestion and pipeline creation into a SIEM; which in this case will be SecurityO...
Building a Cyber Range PT II
Cyber Range PT II Welcome back! In part 2 of this blog post we will be configuring our networks, configuring PFSense and joining servers/workstations to our domain. Let’s get started! Where we ...
Building a Cyber Range PT I
Intro Hello reader! This is the first post in a series that I’ll be writing detailing how to create a production environment cyber lab. This post will be going over the planning process, networking...
Utilizing Zeek Intel
Intro to Zeek Intel Hello! The main focus of this blog post is going to be about Zeek Intelligence. I’m writing this as it’s something that I’ve been requested to setup and configure before and ...
Building a Home Lab
Home Lab Principles I thought it would be fitting for my first post to be about the homelab that I designed, created and built. There are a lot of homelab guides on the internet, but I noticed tha...
- 1
- 1 / 1