Recently Updated Pages
Configuration Management
Repository Structure and Location New Deployment/Provisioning Process
Cloud Platform
Host Setup Notes (Installation, storage configuration) Management Access Procedures
Virtualization Platform
Host Setup Notes (Installation, storage configuration) Management Access Procedures
Security Policies
Firewall Zone Definitions (e.g., DMZ, LAN, IoT) Core Access Rules (e.g., Management access allowe...
Symmetric Encryption
Overview Symmetric encryption, or secret-key encryption, is a fundamental cryptographic method wh...
Diffie-Hillman Key Exchange
Asymmetric Encryption
Notes
Setting up Beats on Capstone This is done for logging that attacks before attacking Log into c...
The Important of the Scope of Engagement
Penetration testing is a critical part of securing businesses; however, without limitations, it c...
Project Write Up
RedTeam vs. BlueTeam Devices Kali Capstone Elk Set Up Beats Need to set up beats ...
Hosts
# This is the default ansible 'hosts' file. # # It should live in /etc/ansible/hosts # # - Comm...
Ansible Config
# config file for ansible -- https://ansible.com/ # =============================================...
FileBeat Config
######################## Filebeat Configuration ############################ # This file is a ful...
MetricBeat
GNU nano 4.8 metricbeat.yml --...
MetricBeat Config
###################### Metricbeat Configuration Example ####################### # This file is a...
ELK Install
--- - hosts: elk become: true tasks: - name: Set vm.max_map_count to 262144 a...
Docker Install
--- - name: InstallDVWA hosts: webservers become: true tasks: - name: Uninstall apache h...
FileBeat
GNU nano 4.8 filebeat.yml --...
Elastic Stack Deployment
The files in this repository were used to configure the network depicted below. These files ha...
Forensic Report
Investigator Information David RizzoB.S. Cyber SecurityWilmington University, New Castle, Dela...