hack3rs.ca network-security
/srv/hack3rs.ca :: white-hat-learning-hub

analyst@hack3rs:~$ cat index.html

Free network security learning — protocols, threats, tools, and defensive workflows. No courses. No paywalls.

analyst@hack3rs:~$ cat scope.txt

White-hat content: attack vectors, defenses, tools, and learning paths for defenders.

focus

Network defense: visibility, hardening, detection, and incident response.

audience

SOC analysts, sysadmins, students, and people switching into security.

approach

Threat-informed, tool-practical. We cover the tools defenders actually run.

Network Security Threats and Defensive Priorities

evergreen

Durable attack vectors, practical defenses, and hands-on tool guidance — from a white-hat, operations-first perspective. The goal is working knowledge, not vendor marketing.

threat-signals.log

why-this-matters.txt

Most teams don't need more tools — they need better prioritization. Asset inventory, identity hardening, visibility, KEV-driven patching, and practiced response deliver more than another product license.

Framework anchor: NIST CSF (Govern, Identify, Protect, Detect, Respond, Recover)
Threat model anchor: MITRE ATT&CK for enterprise + network devices + cloud platforms
open /threats Detailed pages for the four main attack vectors listed on the homepage

learning-paths.md

Work through these modules in order. Traffic interpretation and defensive operations first — advanced tooling comes after you can read a packet and explain what it means.

defender-toolkit-index.json

These are the tools defenders actually run. Learn what each one is best at, where it fits in a workflow, and what its output is telling you — not just how to invoke it.

defender-starter-checklist.sh

# Inventory internet-facing assets, remote access systems, and network devices.
# Turn on MFA for remote/admin access and review inactive accounts.
# Centralize firewall, VPN, IDS/IPS, DNS, and auth logs.
# Patch internet-facing KEV-listed vulnerabilities first, then high-risk exposures.
# Baseline alerting for auth anomalies, DNS spikes, scanning, and exfil patterns.
# Drill one ransomware and one DDoS response scenario each quarter.

global-security-conferences-calendar.md

Key conferences organized by the month they normally fall in — DEF CON, Black Hat, BSides, RSAC, CCC, and more. Dates shift year to year; confirm on the official site before booking anything.

Month labels are recurring patterns, not confirmed dates. Always verify on the official site before travel.

open /security-conferences Browse the full conference calendar by recurring month and region

network-security-faq.schema

Common questions with direct answers. Also published as structured FAQ data to help these show up in search.

open /network-security-faq Detailed beginner FAQ on careers, schools, skills, labs, ethics, and getting started in network security

What should I learn first in network security?

TCP/IP, DNS, and routing first. Then packet analysis with Wireshark, discovery with Nmap, and telemetry/detection with Zeek and Suricata. Add vulnerability management and incident response once you can read a log and explain what it means.

How do I prioritize vulnerabilities?

CISA KEV first — patch what's actively exploited on internet-facing systems. Then rank by asset criticality and exploitability. CVSS score alone will steer you wrong.

Do I need both Zeek and Suricata?

Usually yes. Zeek produces structured protocol logs useful for hunting and retrospective investigation. Suricata handles signature-based and protocol-aware detection. They solve different problems — run both if you can.

Which framework should guide a small team?

Start with CISA CPGs — they're operationally concrete. Use NIST CSF 2.0 to structure the program. Use MITRE ATT&CK to map detection gaps. That order keeps the team doing work rather than producing frameworks about work.

canada-government-cyber-careers.lst

Canadian federal agencies with active cyber missions — CSE/Cyber Centre, RCMP NC3, CSIS, SSC, DND, and more. Official links included; check GC Jobs for current postings.

Nearly every federal department hires cyber professionals. Mandates and hiring pages change — verify on the official site and GC Jobs before applying.

open /cyber-careers Browse Canadian federal agencies, cyber mission areas, and official careers links

network-security-certifications.lst

Certifications help structure study and signal baseline knowledge to employers. Start with Network+, not Security+. Pair every cert with labs, packet analysis, and logging practice — or the cert becomes theory without depth.

Choose certs that match the role you actually want: network ops, SOC, IR, cloud, or governance. Follow the roadmap, not cert vendor marketing.

open /netsec-certifications See recommended cert order, timelines, and detailed learning guidance for each certification