An overview of Information security best practices from SANS, NIST, ISACA, ISO and the Center for Internet Security. We are currently focusing on the SANS Intrusion Detection Cheat Sheet for Linux. This cheat sheet helps Linux administrators find evidence of system compromise or unauthorized access. As presented in the video, here’s the list of […]

Read more

We are using Kali Linux and Nmap to gather information from our network. We walk you through five different types of Nmap scans. Aggressive scan – TCP scan covering the 1000 well known ports Specific Port Scan – Scanning a specific port All port scan – Scanning port 1 to 65535 UDP scan – A […]

Read more

At Section 9 we use VMWare ESXi version 6 for most of our testing. An initial installation of Kali Linux didn’t provide us with a full screen desktop. This video goes through the steps I took to get a full desktop working on ESXi.

Read more

We are double checking the security of our Ubuntu VPS with Kali Linux and Nmap. We’ve setup a virtual privet server on DigitalOcean. We implemented the DigitalOcean security recommendations. The last step is to verify our security with an aggressive nmap scan. This is just an introduction into information security or cybersecurity.

Read more