🗃️ Wazuh Implementation
12 items
📄️ SIEMs and Google Chronicle
Research piece
📄️ Security for Flutter Applications
Research piece
📄️ Authenticate features and encryption
Research Piece
📄️ Jenkins and Snyk – a SAST plugin
Research Piece
📄️ Build a project on google compute engine VM by using Jenkins Google Compute Engine Plugin instruction manual
Research Piece
🗃️ Nagios Implementation
3 items
📄️ Virtual Private Cloud
Research Piece
📄️ Two Factor Authentication Bypass
Progress of 2FA in Redback
📄️ Major Areas of Redback to be Monitored
See following document for response
📄️ How We Can Monitor Major Areas
In response to major areas review
📄️ Feasibility Study on Implementing OpenCTI
Feasibility Study on Implementing OpenCTI
📄️ Jenkins Automation Security
Research Piece
📄️ Security Information and Event Management Systems
SIEM Research Piece.
📄️ Two Factor Authentication
Research Piece
📄️ TPM Research
Trusted Platform Module
📄️ Feasibility Study on Implementing OpenCTI Template
Feasibility Study on Implementing OpenCTI Template (Guide)
📄️ pFsense Install Guide
Research Piece
📄️ pFsense Configuration Guide
Research Piece
📄️ Feasibility Study of Integrating Hayabusa into Redback Operations' Cybersecurity Framework
Last Edited Devika Sivakumar Version: 1.0.
🗃️ CI CD Research
4 items
📄️ Additional Research Pieces
For those that are a bit too long, or pending conversion
🗃️ Servicesnow
1 item
📄️ Efficient and Effective Way of Analyzing TTPs of Malware
Introduction
📄️ Threat Intelligence
1. Introduction