🔐 Cybersecurity
Threats, controls, and frameworks that keep everything else trustworthy.
Frameworks
- MITRE ATT&CK
- NIST CSF
- ISO 27001
- CIS Controls
- Zero Trust Architecture
Defensive controls
- Network segmentation → Segmentation
- IDS / IPS (Suricata, Snort, Zeek)
- SIEM (Splunk, Elastic, Sentinel, Wazuh)
- EDR / XDR
- WAF
Offensive / testing
- Nmap
- Burp Suite
- Metasploit
- CTFs
Cryptography
- TLS / mTLS
- PKI
- Symmetric vs asymmetric
- → see Encryption
Identity & Access
- → see Authentication, Identity
All Cybersecurity notes
TABLE WITHOUT ID file.link AS "Note", type AS "Type", tags AS "Tags"
FROM "07 - Cybersecurity"
WHERE type != "moc"
SORT file.name ASC