Category: TryHackMe

  • Intro to Cloud Security

    Task 1ย ย Introduction ๏ปฟCloud computing is one of the IT industry’s most common and evolving terms. In simple terms, it means delivering computing services over the internet. The customer does not need to buy and maintain physical data centres and servers in cloud computing. Instead, all services can be used with pay-as-you-go pricing (pay as per the usage…

  • Virtualization and Containers

    Task 1ย ย Introduction As computing has become more prevalent in daily life, the need for computing resources, accessibility, and extensibility is larger than ever. With access to computing resources limited, technology has needed to adapt to allow those without direct access to resources to still access modern technology. Thus, cloud computing and virtualization have come to…

  • Network Security Protocols

    A network protocol specifies how two devices, or more precisely processes, communicate with each other. A network protocol is a pre-defined set of rules and processes to determine how data is transmitted between devices, such as end-user devices, networking devices, and servers. The fundamental objective of all protocols is to allow machines to connect and…

  • Network Device Hardening

    Task 1ย ย Introduction Network devices are the building blocks and backbone of today’s contemporary and large-scale networks and systems. The role of network devices is to ensure reliable and efficient transfer, filtering, and management of data across or within networks. Many network devices range from basic layer one hubs or repeaters to layer two switches, layer…

  • Active Directory Hardening

    Active Directory (AD) is widely used by almost every big organisation to manage, control and govern a network of computers, servers and other devices. The room aims to teach basic concepts for hardening AD in line with best cyber security practices. Learning Objectives The topics that we will cover in this room include: Prerequisites Before…

  • Microsoft Windows Hardening

    Task 1ย ย Introduction The room aims to teach basic concepts required to harden a workstation coupled with knowledge of services/software/applications that may result in hacking a computer or data breach.Learning ObjectivesIdentity & access managementNetwork managementApplication managementStorage & ComputeImportance of updating WindowsCheat sheet for hardening Windows Task 2ย ย Understanding General Concepts ๏ปฟServices Windows Services create and manage critical…

  • Linux System Hardening

    Task 1ย ย Introduction Linux systems provide a reliable and robust alternative to closed-source systems, such as MS Windows Server and UNIX. Moreover, choosing Linux can help cut down licensing costs dramatically. If you are not convinced, compare the cost of hosting a web server using Debian 11 with the cost of hosting a web server using MS…

  • Secure Network Architecture

    Introduction Networking is one of the most critical components of a corporate environment but can often be overlooked from a security standpoint. A properly designed network permits not only internet usage and device communication but also redundancy, optimization, and security. In a well-designed network, if a switch goes down, then packets can be redistributed through…

  • Vulnerability Management

    Task 1ย ย Introduction As per NIST, a vulnerability is defined as “A weakness in an information system, system security procedures, internal controls, or implementation that could be exploited or triggered by a threat source“. In this room, we will learn the process of effectively identifying, detecting, mitigating, and reporting a vulnerability in a system in line with standard frameworks. The room…

  • Risk Management

    Task 1ย ย Introduction You have just finished your work, prepared a hot cup of coffee, and decided to finish a new room on your favourite cyber security training platform. Now you want to enjoy your coffee while completing the roomโ€™s tasks; however, you pause momentarily and think, โ€œWhat if the coffee spills on your desk and…