Welcome to our resource list, a compilation of valuable materials shared by members of the Cybersecurity Club.
Whether you are looking to enhance your knowledge or explore the world of cybersecurity, these resources have something for everyone.
We invite you to explore these topics and, if you're interested in learning more, consider joining us to connect with fellow enthusiasts and expand your skills.
New Resources
Here’s what’s new in Cybersecurity Club this week…
#1 New Members: Welcome!
This week, we welcomed 50+ new members, each with unique backgrounds and aspirations. Here’s a few examples of who joined recently:
A seasoned professional with 22 years in infrastructure, operations, and security, including 14 years as a consultant. They have a broad knowledge of security practices, from governance to incident response, and are eager to share what they've learned.
A newcomer eager to learn from experienced members and seeking guidance on advancing their cybersecurity career. They have an interest in both blue team and red team mentorship and are open to providing limited mentorship themselves.
A recent learner who completed the Cybersecurity 101 path and is exploring their next steps. They have an interest in penetration testing but lean towards defensive security, considering paths in SOC Level 1 and Security Engineering.
We are now over 500 members strong, and growing fast! Thank you to everyone who has been inviting their friends and colleagues to join.
#2 Free Splunk Training Courses
Free Courses: There are free coupon codes available for two Splunk courses and another for a pentest and bug bounty course. Check the LinkedIn posts for details:
#3 Gmail Phishing Resource
Phishing Attack Resource: A recent article discusses an advanced phishing campaign leveraging Gmail and Google Sites, demonstrating a technique known as "living off the land," which utilizes existing resources in the environment for malicious purposes. Read more here.
#4 Azure Security Resources:
When building Azure VMs, remember that by default, a public IP is assigned, making RDP accessible to the internet. It's important to uncheck the public IP option unless using templates. Consider implementing a virtual firewall or Azure Firewall for better security. Use network security groups (NSGs) at the subnet level, enable bastion for secure SSH/RDP access, and set up a bastion host. Useful resources:
Was This Resource Helpful? Share It!
If you found this resource useful, please share the link with someone who might benefit from these resources and assist others in learning and growing.
Whether you share via social media (Reddit, X/Twitter, Bluesky, Mastodon), or through email, text message, listserv, or even carrier pigeon—every share counts when the content reaches the right people!
Join Cybersecurity Club (It’s Free!)
We are a world-wide community of cyber enthusiasts with vast experience levels, from beginners to world-class professionals and top cybersecurity trainers.
Join us for collaboration, mutual support, skills development, networking, and connecting with like-minded individuals.
Best,