Activity
Mon
Wed
Fri
Sun
Jan
Feb
Mar
Apr
May
Jun
Jul
Aug
Sep
Oct
Nov
What is this?
Less
More

Owned by Cyber

Cyberseb

Public โ€ข 28 โ€ข Free

Empowering non-IT professionals to embark on a transformative journey into cybersecurity without needing degrees or certifications.

Memberships

CyberDojo

Private โ€ข 48.5k โ€ข Free

AI Automation Agency Hub

Private โ€ข 51.7k โ€ข Free

Skool Community

Public โ€ข 183.6k โ€ข Paid

The Skool Games

Private โ€ข 22.7k โ€ข Free

28 contributions to Cyberseb
Very important
Log type: Security logs are vital for monitoring and analyzing the security posture of an organization. Here are some common types of security logs: 1. **Perimeter Device Logs**: These are generated by firewalls, VPNs, IDS/IPS systems, and other devices that monitor and regulate traffic to and from the network. 2. **Windows Event Logs**: These logs capture events from Windows operating systems, including login attempts, system changes, and application errors. 3. **Endpoint Logs**: These are collected from endpoint devices, such as computers and mobile devices, providing insights into user activities and potential security threats. 4. **Application Logs**: Generated by software applications, these logs track user interactions, errors, and other significant events. 5. **Proxy Logs**: These logs record web traffic that passes through proxy servers, helping to monitor and control internet usage. 6. **IoT Logs**: Collected from Internet of Things (IoT) devices, these logs assist in monitoring and securing connected devices. These logs are essential for detecting and responding to security incidents, ensuring compliance, and maintaining a secure IT environment.
0
0
Very important
Information Security
Describe information Security in 3 words. Information security can be succinctly described as **confidentiality**, **integrity**, and **availability**. These three principles, collectively known as the CIA triad, form the foundation of information security practices, ensuring that sensitive data is protected from unauthorized access, remains accurate and trustworthy, and is accessible to authorized users when needed.
0
0
Information Security
The possible project you can do today to build your experience
Set up a virtual environment with VirtualBox and configure the VMs in vnet to interact with each other. Install pfSense or OPNsense they are firewalls to inspect traffic
0
0
The possible project you can do today to build your experience
Community
The purpose of building this community is to assist you in entering the field of cybersecurity. I have invited industry experts in Governance, Risk Management, and Compliance (GRC), as well as incident response professionals I have worked with over the years. The channel is currently free, so feel free to ask any questions you may have that could help you.
0
0
Cloud Security
So many opportunities in the cloud environment as most enterprise adopt cloud resource. For scalability and cost. These are the cloud policies you normally be dealing with. I have an example Cloud resource deployment in the form of Azure Sentinel. Step by step guide on how to deploy sentinel for log management and analytics, event correlation, incident response etc. Intro to Azure Sentinel - by Sebโšก ๐Ÿ”น๐ƒ๐š๐ญ๐š ๐„๐ง๐œ๐ซ๐ฒ๐ฉ๐ญ๐ข๐จ๐ง โžผEncryption is one of the core technologies used in cloud data security. It involves converting data into unreadable code to protect sensitive information stored in the cloud, both at rest and in transit. ๐Ÿ”น๐ˆ๐๐ž๐ง๐ญ๐ข๐ญ๐ฒ ๐š๐ง๐ ๐€๐œ๐œ๐ž๐ฌ๐ฌ ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ (๐ˆ๐€๐Œ) โžผIAM solutions manage and control who has access to cloud resources and data. These systems provide secure access through multi-factor authentication (MFA), single sign-on (SSO). ๐Ÿ”น๐‚๐ฅ๐จ๐ฎ๐ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐จ๐ฌ๐ญ๐ฎ๐ซ๐ž ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ (๐‚๐’๐๐Œ) โžผCSPM tools continuously monitor and assess an organization's cloud security posture. They help identify misconfigurations and vulnerabilities in the cloud infrastructure. ๐Ÿ”น๐ƒ๐š๐ญ๐š ๐‹๐จ๐ฌ๐ฌ ๐๐ซ๐ž๐ฏ๐ž๐ง๐ญ๐ข๐จ๐ง (๐ƒ๐‹๐) โžผDLP solutions monitor cloud environments to prevent unauthorized sharing or leakage of sensitive data. ๐Ÿ”นZero Trust Security โžผZero Trust security models operate under the principle that no user or device should be trusted by default. ๐Ÿ”น๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐ˆ๐ง๐Ÿ๐จ๐ซ๐ฆ๐š๐ญ๐ข๐จ๐ง ๐š๐ง๐ ๐„๐ฏ๐ž๐ง๐ญ ๐Œ๐š๐ง๐š๐ ๐ž๐ฆ๐ž๐ง๐ญ (๐’๐ˆ๐„๐Œ) โžผSIEM platforms aggregate and analyze security-related data from cloud environments in real time. They help identify potential security incidents, provide alerts, and generate reports for compliance. ๐Ÿ”น๐‚๐ฅ๐จ๐ฎ๐ ๐€๐œ๐œ๐ž๐ฌ๐ฌ ๐’๐ž๐œ๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐ซ๐จ๐ค๐ž๐ซ (๐‚๐€๐’๐) โžผCASB solutions act as intermediaries between users and cloud service providers, enforcing security policies and controlling access. ๐Ÿ”น๐€๐ซ๐ญ๐ข๐Ÿ๐ข๐œ๐ข๐š๐ฅ ๐ˆ๐ง๐ญ๐ž๐ฅ๐ฅ๐ข๐ ๐ž๐ง๐œ๐ž ๐š๐ง๐ ๐Œ๐š๐œ๐ก๐ข๐ง๐ž ๐‹๐ž๐š๐ซ๐ง๐ข๐ง๐  (๐€๐ˆ/๐Œ๐‹) โžผAI and ML technologies are revolutionizing cloud data security by improving threat detection and response capabilities.
0
0
Cloud Security
1-10 of 28
Cyber Seb
2
14points to level up
@cmdr-sa-3423
Seb brings over a decade of expertise in Cybersecurity, with experience at top tech companies, ready to secure your organization's future.

Active 1d ago
Joined Oct 4, 2024
powered by