lightbulb-onMethodologies

There are many different types ex. to pass the OSCP, Bug bounty, incident response, etc. Like many, I would suggest to look at other people's methodologies and build your own. By building your own from your own writeups, notes and then looking at external sources to complete it, you learn a lot more than you would if you simply copied someone else's. Take notes. There are free applications available to help you keep detailed notes whether it's your methodology, courses, exercises it's important to keep notes.

I have divided them in two categories:

Defensive

SIEM simulations and playbooks

Playbooks by SOCFortress on GitHubarrow-up-right gives a good overview of what's in a playbook.

LetsDefendarrow-up-right : platform with alerts that simulates a SIEM, with a playbook.

Risk assessment

Learn what it is and how to perform it in this Crowdstrike articlearrow-up-right.

Business Continuity and Disaster Recovery Plan

Learn about what it is and how to build one on this article on the Oracle websitearrow-up-right.

Guide to Data Loss Prevention

Learn what it is and how to implement it in this crowdstrike articlearrow-up-right.

Cloud security guidance

How to choose, configure and use cloud services securely. Guidance arrow-up-rightby the National Cyber Security Centre (UK).

SANS

Security policy templates, white papers, free tools...

Offensive

Cover

The Bug Hunter's Methodology

by Jhaddix

You can look at the youtube playlist, github or this pdf filearrow-up-right.

Cover

Nahamsec

tutorials

You can learn from his bug bounty videos and add it to your own methodology.

Cover

STÖK

tutorials

You can learn from his bug bounty videos and add it to your own methodology.

Cover

Zseano's methodology

Identifying security vulnerabilities in web applications

He has released a free pdf versionarrow-up-right of his methodology. You can watch the YouTube video about it linked below and there's also a websitearrow-up-right with challenges and guides to help you.

Both

Knowledge base of adversary tactics and techniques based on real-world observations. Can be used in simulated attacks and by defensive teams.

Knowledge base, but more specifically a knowledge graph of cybersecurity countermeasure techniques

Last updated