- IBM X-Force Exchange
- McAfee Threat Intelligence Exchange
- The DShield Blocklist
- The Top Cyber Threat Intelligence Feed
- IP Threat - Checks IP Addresses against major open source threat intelligence feeds.
- IP Address Tools
OpenAM
Palo Alto Networks
- Applipedia
- Getting-Started-User-ID
- How to Generate a CSR (Certificate Signing Request) & Import the Signed Certificate - Live Community Article
- Tips & Tricks: Filtering the security policy - Live Community Blog
- What I wish I had known starting with Palo Alto Networks
- Palo Alto Firewalls - Getting Started: The Series
- DotW: URL filtering with PAN-OS 8.0
- There's a key?! Passwords or private keys on the FW
- PALO ALTO NETWORKS SSL INTERCEPTION AND GOOGLE CHROME’S QUIC
- PA Live Community Dedicated to MineMeld
- PA Zone Protection Profiles - Video
- PA Zone Protection Recommendations
- Tips & Tricks: What is Application Dependency?
- What is a shadow rule
- How to Implement ECMP (Load Balancing) on the Firewall
- Best-Practices-for-PAN-OS-Upgrade
- PAN OS 7.x Create Security Profiles
Application Security
Cheat Sheets
Networking
- Mastering the OSI and TCP/IP Models
- Split Brain DNS
- Cybrary DNS Overview and Zone Transfer Lab
- Networking Blog - Shane Killen
Microsoft
- Group Policy for Beginners
- What Are Domains and Forests?
- NTLM user authentication in Windows
- Windows 10
- Credential Guard
- Windows-10-authentication-the-end-of-pass-the-hash
- RSA 2015 Pass-the-hash-ii-the-wrath-of-hardware
- Protect derived domain credentials with Windows Defender Credential Guard
- BlackHat 2015 - Defeating Pass-the-Hash
- Closer Look at Pass the Hash
- Protect Remote Desktop credentials with Windows Defender Remote Credential Guard
- Technet - Windows 10 Device Guard and Credential Guard Demystified
- MVA - Dive deep into Credential Guard
- MS Virtual Academy
- Channel 9
Certificates - Encryption - PKI - Etc.
Virtualization
Cloud and Cloud Security
Podcasts and Blogs and Sites
No comments:
Post a Comment