Gingsoft
Skip to content
  • Security Operations (SecOps)
  • Hacker Rulebook
  • About Gingsoft
August 31, 2016 Grant Stokley

Mitigation (RS.MI)

Objectives of Mitigation

Activities are performed to prevent expansion of an event, mitigate its effects, and eradicate the incident.

  • RS.MI-1: Incidents are contained
  • RS.MI-2: Incidents are mitigated
  • RS.MI-3: Newly identified vulnerabilities are mitigated or documented as accepted risks

Blue Team - SecOps

  • Security Operations (SecOps)
  • Know Your Attacker
  • InfoSec Conferences

Blue Team - AppSec

  • Secure Coding
    • Input Validation
    • Auth & Password Mgmt
    • Error Handling and Logging
    • Database Security
    • General Coding Practices
    • Output Encoding
    • Data Protection
    • File Management
    • Session Management
    • Cryptographic Practices
    • Communication Security
    • System Configuration
    • Memory Management

Red Team - Hackers

  • Hacker Rulebook
  • InfoSec Conferences
  • GHR 101 – Basic Training Part 1
  • GHR 102 – Basic Training Part 2
  • GHR 103 – Reconnaissance
  • GHR 104 – Windows Hacking
  • GHR 105 – Linux
  • GHR 106 – Vulnerability Scanners
  • GHR 107 – Malware
  • GHR 108 – Sniffers
  • GHR 109 – Session Hijacking
  • GHR 110 – Denial of Service (DoS)
  • GHR 112 – Web Application Hacking
    • Burping a Login Page
    • SQL Injection for MySQL

Hacker Toolbox

  • Master List
  • Aircrack-ng Suite
  • Armitage
  • BEEF
  • BurpSuite
    • Burping a Login Page
  • Metasploit Framework
  • URL Encode/Decode
My Tweets

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
Bloomfield Kentucky
info@gingsoft.com
502.233.2020
  • Twitter link
  • Linkedin link

Copyright Gingsoft 2017

Zerif Lite developed by ThemeIsle