Cybersecurity Ops with Bash: Defensive (Ch.9)

Hi guys, we are back to the series of Cybersecurity Ops with Bash: Defensive workshop solution. Note: This is only workshop solution, NOT A SUMMARY OF DEFENSIVE BASH!!! I do not own the book, I am just reading/learning it and published the solution ONLY. Before you read the workshop solution, it is good if youContinue reading “Cybersecurity Ops with Bash: Defensive (Ch.9)”

Cybersecurity Ops with Bash: Defensive (Ch. 8)

Hi guys, we are back to the series of Cybersecurity Ops with Bash: Defensive workshop solution. Note: This is only workshop solution, NOT A SUMMARY OF DEFENSIVE BASH!!! I do not own the book, I am just reading/learning it and published the solution ONLY. Before you read the workshop solution, it is good if youContinue reading “Cybersecurity Ops with Bash: Defensive (Ch. 8)”

Cybersecurity Ops with Bash: Defensive (Ch. 7)

Hi guys, we will be continuing the series of Cybersecurity Ops with Bash: Defensive workshop solution.  I will be going through Chapter 7: Data Analysis. Note: This is only workshop solution, NOT A SUMMARY OF DEFENSIVE BASH!!!Note: I do not own the book, I am just reading/learning it and published the solution ONLY. Before youContinue reading “Cybersecurity Ops with Bash: Defensive (Ch. 7)”

Design a site like this with WordPress.com
Get started