CyberCorps UK LogoCyberCorps UK
  1. Home
Feeling StupidKeyboard Layout

Security Fundamentals

Foundational Concepts

CIA Triad & Security Controls

Confidentiality, Integrity, Availability principles and security control frameworks

Security Models Overview

Compare Bell-LaPadula, Biba, Clark-Wilson, and Brewer-Nash for layered assurance

The Cyber Kill Chain

Adversary lifecycle phases with controls and detection opportunities

MITRE ATT&CK® Framework

Tactics, techniques, and procedures for threat-informed defense

Cryptography

Symmetric Cryptography

Shared key encryption, AES, and implementation security

Asymmetric Cryptography

Public key cryptography fundamentals (comprehensive guide)

Hashing Algorithms

Cryptographic hash functions, properties, and security applications

Hashing Calculator

Interactive hashing calculator with multiple algorithms

Symmetric Encryption Demo

Interactive symmetric encryption and decryption tool

PKI (Public Key Infrastructure)

Certificate authorities, digital certificates, and trust management

Steganography

Hidden data techniques and LSB bitmap image manipulation

Networking & Security Tools

SSH (Secure Shell)

Secure remote access with key management and authentication

SSL/TLS (Transport Security)

Cryptographic protocols for secure network communications

Nmap

Network mapping and security scanning tool (comprehensive guide)

Tshark

Command-line packet analysis and network troubleshooting

Ettercap

Comprehensive suite for MITM attacks and network analysis

Threats & Vulnerabilities

Malware Types & Detection

Survey of malware families and modern detection techniques

OWASP Top Ten

Critical web application risks with mitigation strategies and labs

CVSS & NVD

Score vulnerabilities and operationalize the National Vulnerability Database

Vulnerability Scanning Techniques

Exposure discovery using authenticated scans, agents, and cloud APIs

Threat Intelligence & Hunting

Run an intelligence-led hunt programme that reduces adversary dwell time

Information Gathering

OSINT

Open Source Intelligence techniques (comprehensive guide)

Google Dorking

Advanced search techniques (comprehensive guide)

System & Data Protection

Document Classification & DLP

Label sensitive assets, apply DLP controls, and govern subjects/objects effectively

Windows Defender & Security

Comprehensive guide to Windows built-in security features

BitLocker Drive Encryption

Microsoft's full-volume disk encryption for data protection

Firewall Technologies

Compare legacy, NGFW, WAF, host-based, and cloud-native firewall controls

Networking

IPv4 Addresses

Unified IPv4 addressing fundamentals, calculators, and references

IPv6 Addresses

IPv6 addressing and configuration (comprehensive guide)

NAT/PAT (Address Translation)

Network address translation for IP conservation and security

VLANs (Virtual LANs)

Network segmentation, trunking, and VLAN security configuration

VPN (Virtual Private Networks)

Site-to-Site, Remote Access, and SSL VPN implementations

RADIUS & TACACS+ Authentication

Centralized AAA protocols for network device access control

Common Ports Reference

Network ports and services reference (comprehensive guide)

DNS Query & Troubleshooting Tools

Compare nslookup, dig, and host to diagnose DNS issues effectively

DNS Infrastructure

Follow resolution from hosts file and caches to root, TLD, and authoritative servers

Ping & Traceroute Toolkit

Compare ping, traceroute, tracert, pathping, and mtr for connectivity analysis

Hardware Components

Processors (CPU)

Intel, AMD, and Apple Silicon architectures and performance comparison

RAM Memory

Memory types, specifications, and performance characteristics

Storage Devices

HDDs, SSDs, NVMe drives, and storage technology comparison

Peripheral Connections

USB, ports, and connectivity standards (comprehensive guide)

Hardware Comparison Tool

Interactive tool to compare and configure computer hardware

CPU Performance Tool

Analyze processor performance for gaming, workloads, and efficiency

RAM Calculator

Calculate memory performance, bandwidth, and suitability for different use cases

Storage Calculator

Compare storage performance, transfer times, and cost analysis

Windows

Windows 11 Clean Install

Offline install workflow and ms-cxh:localonly account bypass

Windows 11 Offline Account

Trigger ms-cxh:localonly to create local admin accounts during OOBE

Reset Your PC

PC reset and troubleshooting guide

DiskPart

Windows disk management command-line utility

Windows Admin Tools

System administration and management

Windows Registry & System32\config

Explore registry hives, SYSTEM32\config files, and safe maintenance practices

PowerShell Execution Policy

PowerShell security settings (comprehensive guide)

Windows 11 File Sharing

Create and manage network shares with security best practices

Install WSL

Windows Subsystem for Linux setup guide

Windows Shortcuts

Essential keyboard shortcuts and commands

Linux & Unix

Linux File Permissions

Master Unix/Linux permissions, ACLs, and access control security

Scripting & Automation

Bash Scripting

Master Linux shell scripting with development environments, constructs, and automation

PowerShell Scripting

Windows PowerShell cmdlets, ISE, and automation techniques

Python Scripting

Python automation, interpreters, and cybersecurity applications

Interactive Scripting Labs

Hands-on laboratories for Bash, PowerShell, and Python scripting

Cloud Computing

Cloud Computing

Comprehensive guide to cloud services, providers, and best practices

Virtualization

VMs, hypervisors, and container technology

IT Governance

Change Management & Asset Lifecycle

IT governance, procurement security, and secure asset disposal processes

Compliance Frameworks

ISO 27000 Series

International information security management system standards

PCI DSS

Payment Card Industry Data Security Standard controls and requirements

SOX (Sarbanes-Oxley)

Financial reporting requirements and key IT general controls

GLBA

Gramm-Leach-Bliley Act data protection expectations for financial institutions

HIPAA

Healthcare privacy, security rules, and safeguarding of PHI

GDPR

European Union personal data protection obligations and governance

UK Data Protection Act

UK GDPR and DPA 2018 duties for controllers, processors, and individuals

UK Computer Misuse Act

Criminal offences and defences for unauthorised access and misuse of IT systems

Common Criteria

Global assurance framework for evaluating security of IT products and systems

Capability Maturity Models

Maturity-level frameworks (CMMI, CERT-RMM) for governing process and resilience improvements

Business Continuity & Disaster Recovery

Resilience planning, continuity execution, and recovery strategies for critical services

SIEM & SOAR Automation

Integrate detection and response platforms using APIs, webhooks, YAML/JSON playbooks, and data pipelines

Other Lectures

Information Warfare

Modern tactics and defense strategies

Backup Strategies

Data backup and recovery methods (comprehensive guide)

Windows & Linux Commands

Command comparison reference (comprehensive guide)

Security Podcasts

Recommended cybersecurity podcasts

A+ Glossary

Essential IT terms and definitions

Yorkshire Burger

Anglo-American fusion recipe

Learning Games

Binary Switch Game

Use eight switches to build a byte in binary and watch the decimal value update instantly.

Hands-on Labs

Windows CMD Lab

Hands-on exercises for Command Prompt basics

Windows Defender Security Lab

Configure antivirus, firewall, and advanced security features

Task Manager Lab

Master all ways to open and use Task Manager

Performance Monitor Lab

Master PerfMon for system monitoring and troubleshooting

BitLocker USB Encryption Lab

Hands-on practice encrypting USB drives with BitLocker To Go

IIS Installation Lab

Install and configure Internet Information Services on Windows 11

Linux Terminal Lab

Master essential Linux/Unix command line operations

macOS Terminal Lab

Unix commands and Mac-specific terminal features

LSB Steganography Demo

1 bit per byte manipulation - hiding text in RGB pixel data

Quizzes

Port Matching Quiz

Match network ports with their services

Service Port Quiz

Choose the correct port for each network service

Numbers

Number Sequences

Mathematical sequences and patterns

Base-10 (Decimal) System

Understanding the decimal number system fundamentals

Base-2 (Binary) System

Binary number system - the language of computers

Base-16 (Hexadecimal) System

Hexadecimal system for memory addressing and networking

ASCII Table

Complete ASCII character encoding reference

© 2024 Michael Stout