Cybersecurity #
Certifications #
Vulnerability Case Studies #
Links #
Info Graphs #

Goodies #
- Great Scott Gadgets
- HackerRF One
- HackerRF Pro
- YARD Stick One
- There are extended versions:
- PortaPack (Shipped in EU!)
- Flipper Zero
- Proxmark 3
Abbreviations #
- VLAN - Virtual LAN
- CSA - Cloud Security Alliance
- CCM - Cloud Controls Matrix
- SDN - Software defined networking
- SDV - Software defined visibility
- VPC - Virtual Private Cloud
- HSM - Hardware Security Modules
- CASB - Cloud Access Security Broker
- MSP - Managed Service Provider
- MSSP - Managed Security Service Provider
- FDE - Full-disk encryption
- TDE - Transparent Data Encryption
- CLE - Column-Level Encryption
- NIST - National Institute of Standards and Technology
- AES - Advanced Encryption Standard
- DES - Data Encryption Standard
- ECC - Elliptic Curve Cryptography
- PKI - Public Key Infrastructure
- CN - Common Name
- SANS - Subject Alternative Names
- CSR - Certificate Signing Request
- DV - Domain Validation
- EX - Extended Validation
- CRL - Certificate Revocation List
- OCSP - Online Certificate Status Protocol
- CPS - Certificate Practice Statement
- DER - Distinguished Encoding Rules
- PEM - Privacy Enhanced Mail
- PFX - Personal Information Exchange
- HMAC - Hash-Based Message Authentication Code
- SHS - Secure Hash Standard
- SHA - Secure Hashing Algorithm
- SCAP - Security Content Automation Protocol
- CGE - Common Configuration Enumeration
- CGE - Common Platform Enumeration
- CVE - Common Vulnerabilities and Exposures
- CVSS - Common Vulnerability Scoring System
- XCCDF - Common Configuration Checklist Description Format
- OVAL - Open Vulnerability and Assessment Language
- SIEM - Security Information and Event Management
- IDS - Intrusion detection systems
- IPS - Intrusion prevention systems
- APT - advanced persistent threat
- STIX - Structured Threat Information eXpression
- TAXII - Trusted Automated eXchange of Intelligence Information
- ISACs - Information Sharing and Analysis Centers
- RAID - Redundant Array of Independent Disks
- RTO - Recovery Time Objective
- UAV - Unmanned Aerial Vehicles
- CCTV - Closed-Circuit TV
- RFID - Radio Frequency Identification
- UEFI - Unified Extensible Firmware Interface
- OEM - Original Equipment Manufacturer
- PCRs - Platform Configuration Registers
- TPM - Trusted Platform Module
- PUFs - Physically Unclonable Functions
- KMS - Key Management Services
- EDR - Endpoint Detection and Response
- DLP - Data Loss Prevention
- HIPS - Host-Based Intrusion Prevention System
- SD-WAN - Software-Defined Wide Area Network
- MPLS - Multiprotocol Label Switching
- SASE - Secure Access Service Edge
- DMZ - Demilitarized Zone
- NAC - Network Access Control
- BPDU - Bridge Protocol Data Unit
- STP - Spanning Tree Protocol
- DHCP - Dynamic Host Configuration Protocol
- VPN - Virtual Private Network
- IPSec - Internet Protocol Security
- AH - Authentication Header
- ESP - Encapsulating Security Payload
- SA - Security Associations
- SSL - Secure Socket Layer
- TLS - Transport Layer Security
- SNMP - Simple Network Management Protocol
- DKIM - DomainKeys Identified Mail
- SPF - Sender Policy Framework
- DMARC - Domain Based Message Authentication Reporting and Conformance
- S/MIME - Secure Multipurpose Internet Mail Extension
- SRTP - Secure Real Time Transport Protocol
- SRTCP - Secure Real Time Control Protocol
- HSTS - HTTP Strict Transport Security
- QoS - Quality Of Service
- DDoS - Distributed Denial-of-Service
- NGFW - Next-Generation Firewalls
- UTM - Unified Threat Management
- ACLs - Access Control Lists
- SSID - Service Set Identifiers
- WPA - Wi‑Fi Protected Access
- CCMP - Counter Mode Cipher Block Chaining Message Authentication Code Protocol
- SAE - Simultaneous Authentication of Equals
- OWE - Opportunistic Wireless Encryption
- WLAN - Wireless Local Area Network
- EAP - Extensible Authentication Protocol
- PEAP - Protected EAP
- EAP-FAST - EAP-Flexible Authentication Via Secure Tunneling
- EAP-TLS - EAP-Transport Layer Security
- EAP-TTLS - EAP-Tunneled Transport Layer Security
- TKIP - Temporal Key Integrity Protocol
- BYOD - Bring-Your-Own-Device
- CYOD - Choose-Your-Own-Device
- COPE - Corporate-Owned, Personally-Enabled
- COBO - Corporate-Owned; Business Only
- VDI - Virtual Desktop Infrastructure
- UEM - Unified Endpoint Management
- MDM - Mobile Device Management
- MAM - Mobile Application Management
- MCM - Mobile Content Management
- GPS - Global Positioning System
- NFC - Near Field Communication
- PII - Personal Identifiable Information
- PHI - Protected Health Information
- DPO - Data Protection Officer