STIG & SCAP

First, visit DISA’s cyber exchange. Download the STIG Viewer (https://public.cyber.mil/stigs/scap/) Download the GPOs Extra (Download the STIG Compilation if you want to STIG additional software) Download the Windows 10 SCAP Benchmarks Additional (Download Windows 10 Documentation) Download the Microsoft LGPO Tool Download the SCAP tools for Windows Move your tools to another folder and ExtractContinue reading “STIG & SCAP”

Maximizing the Use of Public Source Cyber Security Threat Intel

What is Threat Intelligence? Threat intelligence is information about threats and threat actors that helps mitigate harmful events in cyberspace. Threat intelligence sources include open-source intelligence, social media intelligence, human Intelligence, technical intelligence or intelligence from the deep and dark web. Threat Intelligence Use Case 1 Healthcare Sector Let go through some uses cases toContinue reading “Maximizing the Use of Public Source Cyber Security Threat Intel”

CISSP Resources

I spent countless hours studying for the CISSP. I recommend adding the resources below to your study strategy. I read, listened, completed, and watched all the content below. To pass the CISSP you need to get in the CISSP mind set. Good luck and take a look at my YouTube video below! ————————————————–Get in theContinue reading “CISSP Resources”

Nessus, ACAS, and Plugin 101

What is Nessus? Nessus is a remote security scanning tool, which scans computer and identifies vulnerabilities by scanning the system registry, files, ports, missing patches, misconfigurations, and software flaws. Nessus plugins uses the common vulnerabilities and Exposures architecture for easy cross-linking. New exploits are being identified every day so it is important to monitor andContinue reading “Nessus, ACAS, and Plugin 101”