• Home
  • PLTW
  • APCS
  • INFOSEC
  • Blog
  • Assignments
  • Internships
  • Partners
  • Advisors
  • Contact Us
Follow Us

INFOSEC

Information security, sometimes shortened to InfoSec, is the practice of defending information from unauthorized access, use, disclosure, disruption, modification, perusal, inspection, recording or destruction. It is a general term that can be used regardless of the form the data may take (electronic, physical, etc...)

Computer security (also known as cybersecurity or IT security) is information security applied to technology (most often some form of computer system). 

Information assurance
: The act of ensuring that data is not lost when critical issues arise. These issues include but are not limited to: natural disasters, computer/server malfunction, physical theft, or any other instance where data has the potential of being lost.

SECURITYBLOGS


If you are a technology enthusiast or a seasoned information security professional, you may be interested in the following information security blogs. This list was compiled by a community of well-informed industry professionals. As you begin to work your way through each blog, you will begin to appreciate the breadth and depth of the concepts shared among friends and colleagues. Some authors are chief security officers, security engineers, government contractors, university professors, entrepreneurs, and journalists.
Fortinet Security Blog 
Naked Security Blog
Cognitive Dissidents Blog with Joshua Corman 
The New School of Information Security Blog
Dark Reading Blog
Securosis Blog
Krebs on Security with Brian Krebs
Thought Crime Blog with Moxie Marlinspike 
Schneier on Security with Bruce Schneier
Root Labs RDIST with Nate Lawson
Threatpost Blog
Zero Day Blog with Ryan Naraine and Dancho Danchev
Rational Survivability Blog with Christofer Hoff
Securelist Blog
TaoSecurity with Richard Bejtlich
F-Secure News from the Lab Blog
Andrew Hay Blog
Uncommon Sense Security Blog with Jack Daniel
Network Security Blog with Martin McKeay
SANS AppSec Blog with Frank Kim

LINUXDISTROS


Picture
Security Onion is a Linux distro for intrusion detection, network security monitoring, and log management. It's based on Ubuntu and contains Snort, Suricata, Bro, OSSEC, Sguil, Squert, Snorby, ELSA, Xplico, NetworkMiner, and many other security tools. The easy-to-use Setup wizard allows you to build an army of distributed sensors for your enterprise in minutes!

Picture
Kali Linux is an open source project that is maintained and funded by Offensive Security, a provider of world-class information security training and penetration testing services. In addition to Kali Linux, Offensive Security also maintains the Exploit Database and the free online course, Metasploit Unleashed.

Picture
The openSUSE project is a worldwide effort that promotes the use of Linux everywhere. openSUSE creates one of the world's best Linux distributions, working together in an open, transparent and friendly manner as part of the worldwide Free and Open Source Software community.

Picture
The Ubuntu Story
Ubuntu |oǒ'boǒntoō| is an ancient African word meaning 'humanity to others'. It also means 'I am what I am because of who we all are'. The Ubuntu operating system brings the spirit of Ubuntu to the world of computers.


SECURITYCONFERENCES


Picture
Black Hat is the most technical and relevant global information security event series in the world. For more than 16 years, Black Hat has provided attendees with the very latest in information security research, development, and trends in a strictly vendor-neutral environment. These high-profile global events and Trainings are driven by the needs of the security community, striving to bring together the best minds in the industry. Black Hat inspires professionals at all career levels, encouraging growth and collaboration among academia, world-class researchers, and leaders in the public and private sectors.

Picture
The SANS Institute was established in 1989 as a cooperative research and education organization. Its programs now reach more than 165,000 security professionals around the world. A range of individuals from auditors and network administrators, to chief information security officers are sharing the lessons they learn and are jointly finding solutions to the challenges they face. At the heart of SANS are the many security practitioners in varied global organizations from corporations to universities working together to help the entire information security community.

Picture
RSA Conference is helping drive the information security agenda worldwide with annual industry events in the U.S., Europe and Asia. Throughout its history, RSA Conference has consistently attracted the world's best and brightest in the field, creating opportunities for conference attendees to learn about IT security's most important issues through first-hand interactions with peers, luminaries and emerging and established companies. As the IT security field continues to grow in importance and influence, RSA Conference plays an integral role in keeping security professionals across the globe connected and educated.

Picture
(ISC)² Security Congress 2014 offers attendees over 80 education sessions, designed to transcend all industry sectors, focus on current and emerging issues, best practices, and challenges facing cybersecurity leaders. As cyber threats and attacks continue to rise, the goal of (ISC)² Security Congress is to strengthen cybersecurity defenders by arming them with the knowledge, tools, and expertise to protect their organizations.


HOME  |  PLTW  |  APCS  |   INFOSEC  |   BLOG   |  ASSIGNMENTS  |  INTERNSHIPS  |  PARTNERS  | ADVISORS  | CONTACT US
GitHub
Python.org
Ubuntu Link
Picture
GnuPG Encryption

Must Have Security Tools
  • Oracle VM Virtualbox
  • FileZilla | Putty SSH
  • GNU Privacy Guard
  • Tor Browser
  • Hiren's Boot CD
  • OpenVPN GUI
  • Pidgin IM  | Adium IM
  • Kali Linux | Backtrack
  • UNetbootin Linux ISOs
Coding Tutorials + Guides
  • Udacity.com
  • Codeacademy.com
  • Codementor.io
  • TutorialsPoint.com
  • NewCoder.io
  • Edx.org | Udemy.com
  • Characters WIN | MAC
  • Stackoverflow.com
  • W3Schools.com
Software Repos + APIs
  • Bitbucket | GitHub
  • Freecode|Sourceforge
  • Google APIs | Devs
  • 50 Useful APIs
  • Python.org
  • Bootstrap Get | Start
  • Opensource Win | Mac
  • Oracle Opensource
  • Sourceforge.net
EE + Robotics Toolbox
  • Adafruit.com
  • Ardruino
  • Raspberry Pi
  • Electronics Tutorials
  • Engineering Toolbox
  • Ifixit.com
  • Vex Robotics Kits
  • Parallax (Ardruino)
  • RobotC Software 
Software + Game Dev IDEs
  • Android Studio IDE
  • Eclipse | Netbeans
  • Git | Subversion SCM
  • Mercurial SCM
  • Xcode | Codeblocks
  • Sublime Text  Editor
  • Unity Game Engine
  • Autodesk Software
  • Unreal Game Engine
 Copyright  ©  2015-16  Vinson Pluma,  All Rights Reserved