Cyber Security

Incident handling, security implementation, and code auditing

How To Start A Career in Cyber Security

Get to know some of the best ways to enter the cyber security field and how to interact with recruiters. We investigate trends, salaries, and credential ROI

Exploitation

Physical Access Many attacks focus on diret access to a

Netcat

Read and write data across the network, scan for vulnerabilities and more with Netcat.

Vulnerability Scanning

Using tools like Nessus an attacker can check open ports running vulnerable services and exploit them. Always get permission before performing any type of scanning. Sheldyn and its affiliates are not responsible for any harm done to any network. This is for educational purposes only.

Reconnaissance

Reconnaissance lets light up your network like the 4th of July! Always get permission before performing any type of reconnaissance. Sheldyn and its affiliates are not responsible for any harm done to any network. This is for educational purposes only.

Lessons Learned in Incident Handling

What happened and how can we improve our capabilities. Immediately after the system is back online in production start developing a follow-up report.

Recovery in Incident Handling

Back to business, as usual, is the goal in the recovery phase of incident handling. Putting systems back into production in a safe manner is important.

Eradication in Incident Handling

With the bleeding stopped, the goal of the eradication phase is to rid the system of any and all artifacts created by the attacker.

Containment in Incident Handling

isolate the threat to stop the attack from spreading to other systems or causing more damage.

Identification in Incident Handling

Identification phase of incident handling involves detecting threats, vulnerabilities​, and security incidents.