We are building a custom pc, Proxmox based, SOC lab, that is designed for hands on cybersecurity training. Stick around for every part!
#soclab #mutaspace #cybersecurity #proxmox #pcbuild
Here's another podcast I'd love to put you on too!
@hackinghumans focuses on the human side of security. If you want to understand why smart people fall for scams, this is a great place to start!
They cover real stories and explain the psychology behind why people fall for things in a very entertaining way.
I like it because it reminds me that security isn't just about technology but about understanding how people think and how attackers exploit that.
#MutaSpace #Cybersecurity #cyberpodcast #hackinghumans #SecurityEducation
What if you could trap an attacker and watch everything they do?
That's a honeypot. A fake system designed to look real, attract attackers, and monitor their every move.
Think bait car, but for hackers.
Swipe through to see how it works.
#TechTermTuesday #MutaSpace #Cybersecurity #Honeypot #SecurityEducation
Tool I've been enjoying: NotebookLM
Upload documents, articles, or videos and have a conversation with them.
Ask questions, get summaries, and skip the parts that don't matter.
The feature that got me? It generates a podcast-style audio overview. Two AI hosts breaking down your material like an episode. It's actually pretty cool!
I use it for dense security research or to help me study.
Free right now. Link on the last slide.
#MutaSpace #NotebookLM #ToolSpotlight #LearningTools #ProductivityTools TechEducation
It's very important for your passwords to be secure enough so that guessing isn't realistic! If you haven't already, I hope this convinces you to make that change today.
Looking for a good podcast? Here's one I've been into lately.
Critical Thinking- Bug Bounty Podcast gets into the mindset of security researchers and bug bounty hunters. They get into how they approach problems, find vulnerabilities, and think through systems.
You don't need to be doing bug bounty to get something from it. If you are curious about how people find flaws and think offensively, this is a great listen!
Check it out and let me know what you think!
And of course, drop your recommendations below.
Security Operations Centers aren't one job. They're a whole team.
Tier 1 monitors and triages. Tier 2 investigates and responds. Tier 3 hunts for what the tools miss. And there's more beyond that.
If you're thinking about getting into security, this is one of the most common paths in.
Swipe through to see what each role actually does.
You’ve clicked “accept cookies” a thousand times.
But what did you actually agree to?
Some cookies remember your login. Some follow you across the internet taking notes.
Swipe through to learn the difference.
#TechTermTuesday #MutaSpace #Cookies #DigitalPrivacy #CybersecurityForBeginners