Deisenstein (talk | contribs) |
|||
(4 intermediate revisions by one other user not shown) | |||
Line 2: | Line 2: | ||
Below, is a list of resources, broken down by subject, to help those with an interest in information security expand their horizons. | Below, is a list of resources, broken down by subject, to help those with an interest in information security expand their horizons. | ||
== General Security Information == | |||
* [http://www.cl.cam.ac.uk/~rja14/book.html Security Engineering — The Book] - Free Online Book (with non-free paper/ebook versions) | |||
* [https://benchmarks.cisecurity.org/downloads/multiform/index.cfm Center for Internet Security Benchmarks] | |||
== Auditing == | == Auditing == | ||
* [https://www.worldcat.org/oclc/70836623 The Art of Software Security Assessment] - Book | * [https://www.worldcat.org/oclc/70836623 The Art of Software Security Assessment] - Book | ||
* [https://www.worldcat.org/oclc/226356183 Web Security Testing Cookbook] - Book | * [https://www.worldcat.org/oclc/226356183 Web Security Testing Cookbook] - Book | ||
== Cryptography == | == Cryptography == | ||
Line 25: | Line 23: | ||
== Network Security == | == Network Security == | ||
* [https://www.worldcat.org/oclc/779863403 Hacking Exposed: Network Security Secrets & Solutions] - Book | * [https://www.worldcat.org/oclc/779863403 Hacking Exposed: Network Security Secrets & Solutions] - Book | ||
== OS/System Security Topics == | |||
* Fedora [[Security Features Matrix]] | |||
* [https://www.stigviewer.com/stig/red_hat_enterprise_linux_6/ Security Technical Implementation Guide (RHEL 6)] ''(contains mainly useful tips for securing Fedora systems)'' | |||
* [https://www.sans.org/reading-room/whitepapers/linux/securing-linux-containers-36142 Securing Linux Containers] - research paper on securing Linux container deployments/infrastructure | |||
== Product-specific Documentation == | == Product-specific Documentation == | ||
Line 44: | Line 47: | ||
* [https://www.owasp.org OWASP free and open software security community] | * [https://www.owasp.org OWASP free and open software security community] | ||
* [https://github.com/OWASP/DevGuide/tree/dc5a2977a4797d9b98486417a5527b9f15d8a251/DevGuide2.0.1 OWASP Security DevGuide] - Book | * [https://github.com/OWASP/DevGuide/tree/dc5a2977a4797d9b98486417a5527b9f15d8a251/DevGuide2.0.1 OWASP Security DevGuide] - Book | ||
* [https://www.dwheeler.com/secure-programs/Secure-Programs-HOWTO/ Secure Programming HOWTO] - book by David A. Wheeler | |||
== Free Security Training == | |||
* [http://www.pivotproject.org/ Pivot Project for Cyber Skills] | |||
* [http://www.cs.fsu.edu/~redwood/OffensiveComputerSecurity/ FSU Offensive Computer Security Class] | |||
== Non-Free Security Training == | == Non-Free Security Training == | ||
* [https://www.redhat.com/en/services/training/rh413-red-hat-server-hardening RH413: Server Hardening] - goes along with the [https://www.redhat.com/en/services/training/ex413-red-hat-certificate-expertise-server-hardening-exam EX413] exam for certification | * [https://www.redhat.com/en/services/training/rh413-red-hat-server-hardening RH413: Server Hardening] - goes along with the [https://www.redhat.com/en/services/training/ex413-red-hat-certificate-expertise-server-hardening-exam EX413] exam for certification | ||
* [https://www.sans.org/course/security-essentials-bootcamp-style SANS SEC401: Security Essentials Bootcamp Style] | * [https://www.sans.org/course/security-essentials-bootcamp-style SANS SEC401: Security Essentials Bootcamp Style] | ||
* [http://www.eccouncil.org/Certification/certified-ethical-hacker Certified Ethical Hacker v9 Training Program] | |||
== Memberships/Fellowship == | |||
== Memberships/Fellowship/Certifications == | |||
* [https://www.issa.org/ Information Systems Security Association (ISSA)] | * [https://www.issa.org/ Information Systems Security Association (ISSA)] | ||
* [https://www.isc2.org/ The International Information Systems Security Certification Consortium (ISC)2] | |||
[[Category:Security]] | [[Category:Security]] | ||
[[Category:Education]] | [[Category:Education]] |
Latest revision as of 13:06, 16 April 2017
Information security is a specialized skill-set that requires years of education and experience to master. Unfortunately, many security gurus agree that it's next to impossible to teach many of the skills necessary to become an expert. While we agree with this we'll, in any case, try to lead those willing to put in the time to expand their knowledge of information security.
Below, is a list of resources, broken down by subject, to help those with an interest in information security expand their horizons.
General Security Information
- Security Engineering — The Book - Free Online Book (with non-free paper/ebook versions)
- Center for Internet Security Benchmarks
Auditing
Cryptography
Encryption
- PKI Crash Course
- U.S. NSA Suite B Cryptography Guidance
- Bulletproof SSL and TLS
- Mozilla Security/Server Side TLS guide
- Mozilla SSL Configuration Generator
Hashing
Network Security
OS/System Security Topics
- Fedora Security Features Matrix
- Security Technical Implementation Guide (RHEL 6) (contains mainly useful tips for securing Fedora systems)
- Securing Linux Containers - research paper on securing Linux container deployments/infrastructure
Product-specific Documentation
Fedora
Red Hat
Secure Programming
- Fedora Secure Coding Guidelines
- Security-related presentations by Ulrich Drepper
- 2011 CWE/SANS Top 25 Most Dangerous Software Errors
- Avoiding the Top 10 Software Security Design Flaws
- Software Assurance Maturity Model
- Security Testing Guide
- Buffer Overflow Attacks: Detect, Exploit, Prevent - Book
- OWASP free and open software security community
- OWASP Security DevGuide - Book
- Secure Programming HOWTO - book by David A. Wheeler
Free Security Training
Non-Free Security Training
- RH413: Server Hardening - goes along with the EX413 exam for certification
- SANS SEC401: Security Essentials Bootcamp Style
- Certified Ethical Hacker v9 Training Program