In Incident Response Planning, David Biser describes the different aspects to consider when creating and implementing an incident response plan. These different aspects act as tools that help an organization create a thorough incident response plan.
Completed YouVerion’s Plan “5 Days to Freedom from Anger in Your Marriage” on Bible.com
https://my.bible.com/reading-plans/17828-5-days-to-freedom-from-anger-in-your-marriage 5 Days to Freedom from Anger in Your Marriage 5 Days Many couples know their marriage has room for improvement, but it is hard to pinpoint exactly why a relationship is suffering. Often times everyday triggers are the culprit. Angry reactions sabotage our marriages. Rather than run from the things that cause conflict, like […]
Finished “Kali Linux Fundamentals” on Cybrary.it
If you’re interested in penetration testing and ethical hacking, then this Kali Linux course is a great place to start your training. Learn about the industry-standard tool for penetration and security testing. This is a foundational course that is designed to provide the basics of Kali distribution, installation, troubleshooting, and navigation.
Completed “IT Glue Certified Technician Exam” by Kaseya University
Completed YouVerion’s Plan “God, Sex and Your Marriage” on Bible.com
https://my.bible.com/reading-plans/929-god-sex-and-your-marriage God, Sex and Your Marriage 21 Days This is a 21-day reading plan that will address some of the most common questions Christian couples have about sex. You will learn what God says about sexual pleasure, healing from the past, forgiveness and even what’s OK to enjoy in the bedroom. Publisher We would like […]
Attended webinar “Your Network, Under Control” by SANS Institute
Attended webinar “Live Hacking Session – Your app is only as secure as your weakest line of code. Shall we hack it?” by SANS Institute
Attended webinar “How does your incident response program stack up?” by SANS Institute
Finished “Malware Threats” on Cybrary.it
Interested in penetration testing and malware analysis? This malware course introduces you to different types of malware, like viruses, worms, and Trojans. Gain hands-on experience in analyzing malicious files, identifying malicious processes, and more.
Finished “Intro to Cyber Threat Intelligence” on Cybrary.it
As attackers and defenders continually try to outsmart one another in this evolving cybersecurity landscape, organizations need to be smart about gathering and analyzing cyber threat intelligence (CTI).This cyber threat intelligence training introduction series will cover the main definitions and concepts related to the CTI world.