• Community
    • Join Discord
    • Industry News
    • Discussions
    • Contact & Support
  • Learn
    • 🧪 Hands-On Labs
    • Featured Courses
    • All Courses
    • Categories
      • Cybersecurity Fundamentals
      • Networking Security
      • Application Security
      • Ethical Hacking
      • Cloud Security
  • Resources
    • Blog
    • Ebooks
    • Podcasts
    • Webinars
  • Pricing
  • About Cybr
    Sign in Sign up

    Cybr logo badge

    Cybr logo badge

    • Community
      • Join Discord
      • Industry News
      • Discussions
      • Contact & Support
    • Learn
      • 🧪 Hands-On Labs
      • Featured Courses
      • All Courses
      • Categories
        • Cybersecurity Fundamentals
        • Networking Security
        • Application Security
        • Ethical Hacking
        • Cloud Security
    • Resources
      • Blog
      • Ebooks
      • Podcasts
      • Webinars
    • Pricing
    • About Cybr
    Sign in Sign up
    AWS CloudTrail best practices security controls cheat sheet banner

    AWS CloudTrail Best Practices (Checklist and Cheat Sheet)

    Are you following CloudTrail best practices? Here’s a simple checklist ✅ Under the hood, AWS Security Hub service is looking for these best practices: ✅ [CloudTrail.1] CloudTrail…

    Christophe November 6, 2023
    0 Comments
    AWS Security Hub Banner

    AWS Security Hub: Getting Started

    Security Hub is a Cloud Security Posture Management (CSPM) service that you can use to perform security best practice checks, aggregate alerts, and enable automated…

    Christophe October 24, 2023
    0 Comments
    AWS Security Services Banner

    AWS Security Services (Cheat Sheet)

    Whether you’re actively trying to secure your AWS environments, you’re studying for the Certified Security Specialty exam, or you’re just curious and want to learn…

    Christophe October 10, 2023
    0 Comments

    Understanding malware classification

    Understanding this isn’t required for the CompTIA Security+ exam, meaning that we’re going beyond the scope of this exam for a few minutes, but I…

    Christophe September 29, 2023
    0 Comments
    Incident response phases for the security+ exam study resource

    Incident response process

    There’s been a security incident in your organization. What do you do? Panic? No ;)! You follow an incident response process. In this article, we’re…

    Christophe September 22, 2023
    0 Comments
    Security Groups (SGs) and NACLs in AWS cheat sheet

    Network ACLs (NACLs) versus Security Groups (SGs) (Cheat Sheet)

    To control the flow of data in and out of your VPCs and Subnets in AWS, you can use Network Access Control Lists (NACLs), Security Groups…

    Christophe September 20, 2023
    0 Comments
    Network Access Control (NAC)

    Network Access Control (NAC)

    In our course, we talk about Zero Trust and how it’s an approach that believes in continuously checking access and policy violations, even within internal…

    Christophe September 15, 2023
    0 Comments
    Security+ modes of operation

    Modes of operation

    We talked about ciphers and block ciphers in the prior post. A block cipher on its own would only ever encrypt a single block of…

    Christophe September 13, 2023
    0 Comments
    Cipher Suites for the CompTIA Security+ Exam

    Cipher Suites

    When you’re using symmetric encryption you can use what’s known as either a stream cipher or a block cipher. They both ultimately encrypt your data,…

    Christophe September 8, 2023
    0 Comments
    AWS SSK monitoring and alerting for security

    Must-have AWS security monitoring & alerting (Cheat Sheet)

    Most of us know that having visibility into our cloud accounts and resources is critical, but it can easily be overwhelming to implement. What should…

    Christophe September 5, 2023
    0 Comments
    Load More

    Get notified of new posts

    Recent Posts

    • AWS CloudTrail Best Practices (Checklist and Cheat Sheet)
    • AWS Security Hub: Getting Started
    • AWS Security Services (Cheat Sheet)
    • Understanding malware classification
    • Incident response process

    Categories

    • Advanced
    • Announcements
    • Application Security
    • Beginner
    • Career
    • Certifications
    • Cloud Security
    • Community
    • Cybersecurity
    • Cybersecurity Fundamentals
    • Ethical Hacking
    • Explained Series
    • Incident Response
    • Intermediate
    • Network Security
    • Programming Languages
    • Scripting

    Recent Comments

    • l4stpl4y3r on Amazon CloudWatch
    • Christophe on [DEMO] AWS Network Firewall – Part 2
    • l4stpl4y3r on [DEMO] AWS Network Firewall – Part 2
    • Christophe on Security concerns with our architecture
    • l4stpl4y3r on Security concerns with our architecture
    Cybr logo badge
    © 2023 - Cybr, Inc
    • Contact
    • Courses
    • Discord
    • Terms of Service
    • Privacy Policy

    Report

    There was a problem reporting this post.

    Harassment or bullying behavior
    Contains mature or sensitive content
    Contains misleading or false information
    Contains abusive or derogatory content
    Contains spam, fake content or potential malware

    Block Member?

    Please confirm you want to block this member.

    You will no longer be able to:

    • See blocked member's posts
    • Mention this member in posts

    Please allow a few minutes for this process to complete.

    Report

    You have already reported this .