Security Tools & Techniques
- Amass - The Information Gathering Tool
- Nmap - The Network Mapper
- Tcpdump Tutorial and Primer
- IPTables Fundamentals
- Security Assessment Types
- Vulnerability Assessment vs Penetration Testing
- Purple Team
- Purple Team Pentests Mean You're Failing
- Security by Obscurity
- When to Use VA vs PT vs Red Team vs Bug Bounty
- Vulnerability Database Resources
System & Network Tools
- DNS Fundamentals
- Git Version Control
- Vim Text Editor
- TMUX Terminal Multiplexer
- LSOF - List Open Files
- ICMP Protocol
- TCP Flags
- Nginx Caching with TempFS
- Ngrok - Secure Tunnels
- Less Common Unix Commands
- Looping Fundamentals
Technical Concepts
- URI vs URL
- Same Origin Policy
- Encoding vs Encryption vs Hashing vs Obfuscation
- Birthday Attack
- Blockchain Technology
- Big Data Explained
- System V vs Systemd
- Positional Number Systems
- Internet vs Deep Web vs Dark Web
- PVSNP - A Problem-Solving Framework
- Class - A Social Framework
- Cellular Technology
- Web Performance
Career & Skills
- Building a Successful InfoSec Career
- InfoSec Interview Questions
- Information Security Definitions
- Programmer vs Hacker vs Developer
- Leadership
- Hiring
Lifestyle & Interests
- Coffee Guide
- Wine Guide
- Beer Guide
- Steak Preparation
- Dining Etiquette
- Photography Basics
- Wardrobe Essentials
- Drinking Guide
- Horsepower Explained
- EDM Music Types