Deployed 4239ecf with MkDocs version: 1.2.3

This commit is contained in:
github-actions
2024-07-28 12:08:43 +00:00
parent f44a0152c4
commit a6af87660e
61 changed files with 1686 additions and 1410 deletions

View File

@@ -2168,21 +2168,33 @@
<h2 id="other-resources">Other Resources</h2>
<p>Some books that would be a great resource</p>
<ul>
<li>Holistic Info-Sec for Web Developers <a href="https://holisticinfosecforwebdevelopers.com/">https://holisticinfosecforwebdevelopers.com/</a>- Free and downloadable book series with very broad and deep coverage of what Web Developers and DevOps Engineers need to know in order to create robust, reliable, maintainable and secure software, networks and other, that are delivered continuously, on time, with no nasty surprises</li>
<li>Docker Security - Quick Reference: For DevOps Engineers <a href="https://leanpub.com/dockersecurity-quickreference">https://leanpub.com/dockersecurity-quickreference</a> - A book on understanding the Docker security defaults, how to improve them (theory and practical), along with many tools and techniques.</li>
<li>How to Hack Like a Legend <a href="https://amzn.to/2uWh1Up">https://amzn.to/2uWh1Up</a>- A hackers tale breaking into a secretive offshore company, Sparc Flow, 2018</li>
<li>How to Investigate Like a Rockstar <a href="https://books2read.com/u/4jDWoZ">https://books2read.com/u/4jDWoZ</a>- Live a real crisis to master the secrets of forensic analysis, Sparc Flow, 2017</li>
<li>Real World Cryptography <a href="https://www.manning.com/books/real-world-cryptography">https://www.manning.com/books/real-world-cryptography</a>- This early-access book teaches you applied cryptographic techniques to understand and apply security at every level of your systems and applications.</li>
<li>AWS Security <a href="https://www.manning.com/books/aws-security?utm_source=github&amp;utm_medium=organic&amp;utm_campaign=book_shields_aws_1_31_20">https://www.manning.com/books/aws-security?utm_source=github&amp;utm_medium=organic&amp;utm_campaign=book_shields_aws_1_31_20</a>- This early-access book covers commong AWS security issues and best practices for access policies, data protection, auditing, continuous monitoring, and incident response.</li>
<li>
<p>Holistic Info-Sec for Web Developers (<a href="https://holisticinfosecforwebdevelopers.com/">https://holisticinfosecforwebdevelopers.com/</a>)&mdash;Free and downloadable book series with very broad and deep coverage of what Web Developers and DevOps Engineers need to know in order to create robust, reliable, maintainable and secure software, networks and other, that are delivered continuously, on time, with no nasty surprises.</p>
</li>
<li>
<p>Docker Security: Quick Reference&mdash;For DevOps Engineers (<a href="https://leanpub.com/dockersecurity-quickreference">https://leanpub.com/dockersecurity-quickreference</a>)&mdash;A book on understanding the Docker security defaults, how to improve them (theory and practical), along with many tools and techniques.</p>
</li>
<li>
<p>How to Hack Like a Legend (<a href="https://amzn.to/2uWh1Up">https://amzn.to/2uWh1Up</a>)&mdash;A hackers tale breaking into a secretive offshore company, Sparc Flow, 2018</p>
</li>
<li>
<p>How to Investigate Like a Rockstar (<a href="https://books2read.com/u/4jDWoZ">https://books2read.com/u/4jDWoZ</a>)&mdash;Live a real crisis to master the secrets of forensic analysis, Sparc Flow, 2017</p>
</li>
<li>
<p>Real World Cryptography (<a href="https://www.manning.com/books/real-world-cryptography">https://www.manning.com/books/real-world-cryptography</a>)&mdash;This early-access book teaches you applied cryptographic techniques to understand and apply security at every level of your systems and applications.</p>
</li>
<li>
<p>AWS Security (<a href="https://www.manning.com/books/aws-security?utm_source=github&amp;utm_medium=organic&amp;utm_campaign=book_shields_aws_1_31_20">https://www.manning.com/books/aws-security?utm_source=github&amp;utm_medium=organic&amp;utm_campaign=book_shields_aws_1_31_20</a>)&mdash;This early-access book covers common AWS security issues and best practices for access policies, data protection, auditing, continuous monitoring, and incident response.</p>
</li>
</ul>
<h2 id="post-training-asks-further-reading">Post Training asks/ Further Reading</h2>
<ul>
<li>CTF Events like : <a href="https://github.com/apsdehal/awesome-ctf">https://github.com/apsdehal/awesome-ctf</a></li>
<li>Penetration Testing : <a href="https://github.com/enaqx/awesome-pentest">https://github.com/enaqx/awesome-pentest</a></li>
<li>Threat Intelligence : <a href="https://github.com/hslatman/awesome-threat-intelligence">https://github.com/hslatman/awesome-threat-intelligence</a></li>
<li>Threat Detection &amp; Hunting : <a href="https://github.com/0x4D31/awesome-threat-detection">https://github.com/0x4D31/awesome-threat-detection</a></li>
<li>CTF Events like: <a href="https://github.com/apsdehal/awesome-ctf">https://github.com/apsdehal/awesome-ctf</a></li>
<li>Penetration Testing: <a href="https://github.com/enaqx/awesome-pentest">https://github.com/enaqx/awesome-pentest</a></li>
<li>Threat Intelligence: <a href="https://github.com/hslatman/awesome-threat-intelligence">https://github.com/hslatman/awesome-threat-intelligence</a></li>
<li>Threat Detection &amp; Hunting: <a href="https://github.com/0x4D31/awesome-threat-detection">https://github.com/0x4D31/awesome-threat-detection</a></li>
<li>Web Security: <a href="https://github.com/qazbnm456/awesome-web-security">https://github.com/qazbnm456/awesome-web-security</a></li>
<li>Building Secure and Reliable Systems : <a href="https://landing.google.com/sre/resources/foundationsandprinciples/srs-book/">https://landing.google.com/sre/resources/foundationsandprinciples/srs-book/</a></li>
<li>Building Secure and Reliable Systems: <a href="https://landing.google.com/sre/resources/foundationsandprinciples/srs-book/">https://landing.google.com/sre/resources/foundationsandprinciples/srs-book/</a></li>
</ul>