securityandcoffee.blogspot.com
Security and Coffee: Information Security Learning Resources part 2
http://securityandcoffee.blogspot.com/2016/12/information-security-learning-resources.html
A place to talk about information security, Internet safety and, of course. coffee! Thoughtful, sometimes controversial, but not following the crowd unless I'm in line at the coffee shop. Tuesday, December 6, 2016. Information Security Learning Resources part 2. Today we have part 2 of a 2-part guest post by security analyst Chris Goff. Chris has collected a set. Of info, links and lists that definitely qualify as extremely cool resources! Just skim it, enjoy it and bookmark it! Integrity is the quality ...
unifiedcompliance.com
STIG Viewer
https://www.unifiedcompliance.com/products/stig-viewer
News, Events & Awards. Awards & Testimonials. A Security Technical Implementation Guide that provides a methodology for standardized secure installation and maintenance of DOD IA and IA-enabled devices and systems. Scope, Define, and Maintain Regulatory Demands Online in Minutes. Lafayette, CA 94549. Stay connected with UCF. 2016 Network Frontiers LLC. Stay connected with UCF.
samdoran.com
STIG Compliance with Ansible - Sam Doran
http://samdoran.com/stig-compliance-with-ansible
My little corner of the Internet. STIG Compliance with Ansible →. Thursday, June 25, 2015 at 21:27 EDT. Bull; ∞. From the moment that I fully grokked the power of idempotence. I immediately saw the potential for Ansible as. Compliance tool. When I worked as a sysadmin for the US Navy, I spent a good deal of my time making sure systems were hardened appropriately according to those guidelines. I used a combination of. Files and shell scripts to the get the job done because I found the existing tools, SRR.
en.wikipedia.org
Security Technical Implementation Guide - Wikipedia, the free encyclopedia
https://en.wikipedia.org/wiki/Security_Technical_Implementation_Guide
Security Technical Implementation Guide. From Wikipedia, the free encyclopedia. A Security Technical Implementation Guide (STIG) is a cybersecurity methodology for standardizing security protocols within networks, servers, computers, and logical designs that enhance overall security. These guides, when implemented, enhance security for software, hardware, physical and logical architectures to further reduce vulnerabilities. Most operating systems are not inherently secure. This page was last modified on ...
cyberdefensetrainingacademy.org
Cyber Defense Training Academy - Resources
https://www.cyberdefensetrainingacademy.org/index.php/resources
The following are websites that CDTA staff and cadets may need for tools, additional training material, competition information, etc. Cyberspace Familiarization Course Coursebook (2014): click here. CDTA Online Training Curriculum (provided by ITPro.tv): click here. Cyber Forensics Challenge: https:/ github.com/cap-cdta/cyber-forensics-challenge. Cyber Patriot Competition: http:/ www.uscyberpatriot.org/. National Collegiate Cyber Defense Competition: http:/ www.nationalccdc.org/. Security Onion Main Site:.
defendthehoneypot.com
Links - Defend The Honey Pot
http://www.defendthehoneypot.com/links
Defend The Honey Pot. This site provides links and info to malware sites. Site for malware sites and block lists. Repository of block lists. Site explains Active Directory attacks and how to defend against them. NSA Information Assurance Site. Repository of how to secure network. Repository for Security Technical Implementation Guides. Adversary Simulation and Red Team Operations (Been on the receiving side a few times). This is a great site for STIG explanations and references. Palo Alto URL/IP Lookup.