No edit summary |
No edit summary |
||
Line 51: | Line 51: | ||
* [https://www.redhat.com/en/services/training/rh413-red-hat-server-hardening RH413: Server Hardening] - goes along with the [https://www.redhat.com/en/services/training/ex413-red-hat-certificate-expertise-server-hardening-exam EX413] exam for certification | * [https://www.redhat.com/en/services/training/rh413-red-hat-server-hardening RH413: Server Hardening] - goes along with the [https://www.redhat.com/en/services/training/ex413-red-hat-certificate-expertise-server-hardening-exam EX413] exam for certification | ||
* [https://www.sans.org/course/security-essentials-bootcamp-style SANS SEC401: Security Essentials Bootcamp Style] | * [https://www.sans.org/course/security-essentials-bootcamp-style SANS SEC401: Security Essentials Bootcamp Style] | ||
* [http://www.eccouncil.org/Certification/certified-ethical-hacker Certified Ethical Hacker v9 Training Program] | |||
== Memberships/Fellowship == | |||
== Memberships/Fellowship/Certifications == | |||
* [https://www.issa.org/ Information Systems Security Association (ISSA)] | * [https://www.issa.org/ Information Systems Security Association (ISSA)] | ||
* [https://www.isc2.org/ The International Information Systems Security Certification Consortium (ISC)2] | |||
[[Category:Security]] | [[Category:Security]] | ||
[[Category:Education]] | [[Category:Education]] |
Revision as of 14:55, 31 December 2015
Information security is a specialized skill-set that requires years of education and experience to master. Unfortunately, many security gurus agree that it's next to impossible to teach many of the skills necessary to become an expert. While we agree with this we'll, in any case, try to lead those willing to put in the time to expand their knowledge of information security.
Below, is a list of resources, broken down by subject, to help those with an interest in information security expand their horizons.
General Security Information
Auditing
Cryptography
Encryption
- PKI Crash Course
- U.S. NSA Suite B Cryptography Guidance
- Bulletproof SSL and TLS
- Mozilla Security/Server Side TLS guide
- Mozilla SSL Configuration Generator
Hashing
Network Security
OS/System Security Topics
- Fedora Security Features Matrix
- Security Technical Implementation Guide (RHEL 6) (contains mainly useful tips for securing Fedora systems)
- Securing Linux Containers - research paper on securing Linux container deployments/infrastructure
Product-specific Documentation
Fedora
Red Hat
Secure Programming
- Fedora Secure Coding Guidelines
- Security-related presentations by Ulrich Drepper
- 2011 CWE/SANS Top 25 Most Dangerous Software Errors
- Avoiding the Top 10 Software Security Design Flaws
- Software Assurance Maturity Model
- Security Testing Guide
- Buffer Overflow Attacks: Detect, Exploit, Prevent - Book
- OWASP free and open software security community
- OWASP Security DevGuide - Book
Non-Free Security Training
- RH413: Server Hardening - goes along with the EX413 exam for certification
- SANS SEC401: Security Essentials Bootcamp Style
- Certified Ethical Hacker v9 Training Program