Template Resources

A collection of templates and resources can be an invaluable asset for anyone working in cybersecurity. These resources may include incident response plans, security policies, risk assessments, and compliance checklists, among others

Social Engineering / OSINT

Social engineering and OSINT (Open Source Intelligence) are techniques that are often used in cybersecurity to gather information and identify vulnerabilities. Social engineering involves manipulating individuals or groups in order to obtain sensitive information or access to restricted areas or systems. It can take many forms, including phishing attacks, pretexting, baiting, and other types of […]

Mobile / Android / iOS

Mobile security resources are essential in the context of cybersecurity as mobile devices have become an integral part of our daily lives

Monitoring / Logging

Monitoring and logging in cybersecurity refers to the process of continuously monitoring and collecting data about network activity and security events, and storing this data in a centralized location for later analysis. Monitoring and logging can be used to identify potential security threats, track the progress of a security incident, or to troubleshoot problems on […]

Scanning / Pentesting

Scanning and pentesting (also known as penetration testing) are important techniques used in cybersecurity to identify vulnerabilities and weaknesses in systems and networks. Scanning involves using automated tools to identify potential vulnerabilities in a system or network, while pentesting involves manually attempting to exploit those vulnerabilities in order to test the security of a system. […]