Wireshark / TShark
Packet analysisBest starting point for protocol troubleshooting, TLS/DNS analysis, and validating what really happened on the wire.
analyst@hack3rs:~$ cat index.html
Free network security learning — protocols, threats, tools, and defensive workflows. No courses. No paywalls.
analyst@hack3rs:~$ cat scope.txt
White-hat content: attack vectors, defenses, tools, and learning paths for defenders.
Network defense: visibility, hardening, detection, and incident response.
SOC analysts, sysadmins, students, and people switching into security.
Threat-informed, tool-practical. We cover the tools defenders actually run.
Durable attack vectors, practical defenses, and hands-on tool guidance — from a white-hat, operations-first perspective. The goal is working knowledge, not vendor marketing.
Pick a path, follow the modules, and track progress yourself. No logins, no checkmarks.
Phishing works because it targets the person, not the system. Email lures, credential-harvesting pages, MFA fatigue, and session theft bypass firewalls and EDR by exploiting the authentication workflow itself.
$ action: Deploy phishing-resistant MFA, add conditional access controls, and build a fast account lock and session revocation playbook you've actually tested.
Exposed services and remote access weaknesses
VPNs, firewalls, admin panels, RDP, SSH, and internet-facing applications are continuously scanned. Attackers don't need to know your organization to find what you've left reachable.
$ action: Maintain a live inventory of exposed services, patch aggressively starting with internet-facing systems, and lock down administrative access paths.
Vulnerability exploitation and misconfiguration abuse
Attackers consistently exploit known weaknesses and insecure defaults, especially on public-facing systems, cloud services, and network appliances. Misconfiguration is usually the multiplier that turns a bug into a breach.
$ action: Prioritize externally exposed assets, enforce secure defaults, and validate remediation with direct testing — not just ticket status.
open /threats/vulnerability-exploitation-and-misconfiguration-abuse
Lateral movement after initial access
Once inside, attackers use shared credentials, over-trusted network paths, and gaps in east-west monitoring to move across systems and escalate privileges before defenders notice.
$ action: Segment networks, reduce admin sprawl, monitor east-west traffic, and alert on abnormal authentication patterns between internal hosts.
Most teams don't need more tools — they need better prioritization. Asset inventory, identity hardening, visibility, KEV-driven patching, and practiced response deliver more than another product license.
Work through these modules in order. Traffic interpretation and defensive operations first — advanced tooling comes after you can read a packet and explain what it means.
These are the tools defenders actually run. Learn what each one is best at, where it fits in a workflow, and what its output is telling you — not just how to invoke it.
Best starting point for protocol troubleshooting, TLS/DNS analysis, and validating what really happened on the wire.
Use for host discovery, port/service enumeration, version checks, and scripted validation of exposed services.
Produces rich protocol logs and metadata for threat hunting and retrospective analysis at scale.
Signature and protocol-aware detection engine for network monitoring, IDS/IPS, and traffic inspection.
Integrated platform for network visibility, host visibility, log management, and case management.
Community vulnerability management stack for recurring scans and remediation workflows.
# Inventory internet-facing assets, remote access systems, and network devices.
# Turn on MFA for remote/admin access and review inactive accounts.
# Centralize firewall, VPN, IDS/IPS, DNS, and auth logs.
# Patch internet-facing KEV-listed vulnerabilities first, then high-risk exposures.
# Baseline alerting for auth anomalies, DNS spikes, scanning, and exfil patterns.
# Drill one ransomware and one DDoS response scenario each quarter. Key conferences organized by the month they normally fall in — DEF CON, Black Hat, BSides, RSAC, CCC, and more. Dates shift year to year; confirm on the official site before booking anything.
Month labels are recurring patterns, not confirmed dates. Always verify on the official site before travel.
open /security-conferences Browse the full conference calendar by recurring month and regionCommon questions with direct answers. Also published as structured FAQ data to help these show up in search.
open /network-security-faq Detailed beginner FAQ on careers, schools, skills, labs, ethics, and getting started in network securityTCP/IP, DNS, and routing first. Then packet analysis with Wireshark, discovery with Nmap, and telemetry/detection with Zeek and Suricata. Add vulnerability management and incident response once you can read a log and explain what it means.
CISA KEV first — patch what's actively exploited on internet-facing systems. Then rank by asset criticality and exploitability. CVSS score alone will steer you wrong.
Usually yes. Zeek produces structured protocol logs useful for hunting and retrospective investigation. Suricata handles signature-based and protocol-aware detection. They solve different problems — run both if you can.
Start with CISA CPGs — they're operationally concrete. Use NIST CSF 2.0 to structure the program. Use MITRE ATT&CK to map detection gaps. That order keeps the team doing work rather than producing frameworks about work.
Framework docs, tool documentation, and conference links. All evergreen — no dated report summaries that go stale.
Canadian federal agencies with active cyber missions — CSE/Cyber Centre, RCMP NC3, CSIS, SSC, DND, and more. Official links included; check GC Jobs for current postings.
Nearly every federal department hires cyber professionals. Mandates and hiring pages change — verify on the official site and GC Jobs before applying.
open /cyber-careers Browse Canadian federal agencies, cyber mission areas, and official careers linksHands-on labs and tool comparisons to turn theory into repeatable workflows. Run the scenario, then explain what you found.
Certifications help structure study and signal baseline knowledge to employers. Start with Network+, not Security+. Pair every cert with labs, packet analysis, and logging practice — or the cert becomes theory without depth.
Choose certs that match the role you actually want: network ops, SOC, IR, cloud, or governance. Follow the roadmap, not cert vendor marketing.
open /netsec-certifications See recommended cert order, timelines, and detailed learning guidance for each certification