Skip to content

Guided Security

Short thoughts on learning more about cybersecurity

  • Home
  • About
  • Reading List

study log

SANS GCIH – Log 2

Posted on August 6, 2019 by DruidSecurity

Almost a week after starting, I have finally finished indexing book 2. I am not sure if I underestimated the amount of time that I need to finish these study sessions, or if I'm just slow, but creating this index is taking much longer than I initially thought. However, after book 2 I am up … Continue reading SANS GCIH – Log 2

Posted in SANSTagged study log

RSS Interesting Articles

  • An error has occurred; the feed is probably down. Try again later.

Tags

Adversary Emulation Analysts Aquatone Asset Management AWS Blacklist Career CDC Cloud cloud forensics Covid19 Cult of the Dead Cow cybersecurity Docker Docs DVSA GCIH GIAC Hackers Hacking Incident Response jobs kms Lambda Logging Malware Simulation Network Attack NIDS PCAP permissions Playbooks s3 SANS scanning Security SecurityOnion Serverless SIEM Storage study log Terraform tools Training
Website Powered by WordPress.com.
Privacy & Cookies: This site uses cookies. By continuing to use this website, you agree to their use.
To find out more, including how to control cookies, see here: Cookie Policy
  • Subscribe Subscribed
    • Guided Security
    • Already have a WordPress.com account? Log in now.
    • Guided Security
    • Subscribe Subscribed
    • Sign up
    • Log in
    • Report this content
    • View site in Reader
    • Manage subscriptions
    • Collapse this bar
 

Loading Comments...