This is a low cost credit card sized desktop computer that runs Linux and it also provides a set of GPIO (general purpose input/output) pins. It enables people to explore computing and learn Programming.
2. Rubber Ducky USB
The Rubber ducky looks similar to a USB Pen drive, it can be used for variety of attacks, hack a system, inject a keystroke into a system, inject payloads and also steal information and sensitive data.
3. LAN Turtle
The LAN Turtle by Hak5 is a covert Systems Administration and Penetration Testing tool providing stealth remote access, network intelligence gathering, and man-in-the-middle surveillance capabilities through a simple graphic shell.
4. Crazy Radio
This is a long range open USB radio dongle Radio power amplifier giving 20dBm output power · 1km range LOS with Crazyflie 2.0. It is also a great building block for systems that require longer range than WiFi
5. Cactus WHID (Keylogger)
This is a Keylogger it allows Keystrokes to be sent through WiFi to a target Machine.
The target recognises the Ducky as both a standard HID keyboard and a serial port, allows interactive commands and scripts to be executed on the target remotely.
6. Dstike Wi-Fi Duether
Dstike can kick devices off a network irrespective of whether you are connected to it or not, it scans for nearby networks and selects individuals or networks it wants to kick out then kick it out
7. Magspoof
Magspoof allows its user to store different kind of credit cards and magstripes in one device. The device that can spoof/emulate any magnetic stripe or credit card
8. Ubertooth One
Ubertooth One is a small, open-source USB device with an antenna powered by an ARM Cortex-M3 chip and a CC2400 wireless transceiver. You can sniff and monitor Bluetooth signals from nearby devices
9. Wi-Fi Pineapple
Wi-Fi Pineapple is a wireless auditing platform from Hak5 that allows network security administrators to conduct penetration tests.
You can start by reading books, articles, blogs, and videos on GRC topics, such as governance frameworks, risk management methodologies, compliance standards, and best practices.
2. Get a relevant Degree/Certification:
Having a degree or certification in a related field can boost your credibility and qualifications for a GRC job.
Some of the common degrees that GRC employers look for are:
- Cybersecurity
- Business
- Computer Science
- Legal
- Information Technology
Some of the popular certifications that GRC employers value are:
- CompTIA Security+
- Certified in Risk and Information Systems Control (CRISC)
- Project Management Professional (PMP)
- Certified Information Systems Auditor (CISA)
- Certified Information Systems Security Professional (CISSP)
- Certified Information Privacy Manager (CIPM)
- Certified Ethical Hacker (CEH)
You don't need to have all of these degrees or certifications, but having at least one or two can demonstrate your commitment and expertise in GRC.
3. Familiarize yourself with the common GRC standards and frameworks:
- ISO 27001: An international standard for information security management systems
- PCI DSS: A set of security standards for payment card industry
- ITIL: A framework for IT service management
- COBIT: A framework for IT governance and management
Basics of Cybersecurity:
-Computer Networking
-Computer Hardware Components
-Understand Basics of Popular Suites (Google Suite, iCloud, MS Office)
-Understanding Operating Systems (Linux, MacOS, Windows)
-Network Topologies
-Common Ports and their uses
-IPv4 and IPv6
-Basics of Subnetting
-Cyberattacks and Cybercrimes
-Cryptography
-Understand Common Standards (ISO, NIST, CSF…)
-Understanding Common Distros for Hacking (Kali Linux, ParrotOS)
…
Cybersecurity Mesh Architecture (CSMA):
-Learn about CSMA for a flexible and collaborative security ecosystem.
Zero Trust Architecture:
-Study principles of Zero Trust to enhance security frameworks.
Step 2: Technical Skills:
Programming:
-Master languages such as Python, C, and JavaScript
Operating Systems:
-Gain expertise in Linux, especially Kali Linux for security testing.
Cloud and Application Security:
Learn about securing cloud environments and application security concepts, including encryption protocols and regular security audits.
⁃Websites to learn Cybersecurity (Free)
⁃Websites to learn Hands-on skills (Free)
⁃Websites for Cybersecurity Trends
⁃Websites to review your resume (free)
⁃Websites for interview preparation
⁃Cybersecurity Certifications
⁃Cybersecurity skills in demand
A Thread
Websites to Learn Cybersecurity for Free:
1. TryHackMe- Offers gamified lessons and hands-on labs. 2. Coursera- Provides free courses from universities and institutions. 3. Cybrary- Free courses on various cybersecurity topics. 4. Open Security Training- Free training on a wide range of security topics. 5. EDX - Free courses from top universities. 6. FutureLearn- Offers free cybersecurity courses. 7. Udemy- Free courses on cybersecurity basics. 8. Springboard- Lists various free cybersecurity resources. 9. SANS Cyber Aces- Free online courses on cybersecurity fundamentals. 10. NIST - Offers free and low-cost online educational content
Websites to Learn Hands-on Free Cybersecurity Skills:
1. TryHackMe- Hands-on exercises and labs. 2. Hack The Box- Real-world penetration testing labs. 3. OverTheWire- Wargames to practice security concepts. 4. Cybrary- Hands-on labs and exercises. 5. RangeForce- Interactive cybersecurity training. 6. Immersive Labs- Hands-on labs and challenges. 7. PentesterLab- Hands-on web application security training. 8. StationX- Offers practical cybersecurity training. 9. nfosec Skills- Hundreds of hands-on courses. 10. Practical Pentest Labs- Realistic penetration testing labs.
Flipper Zero is a toy-like portable hacking tool. The device is able to read, copy, and emulate RFID and NFC tags, radio remotes, iButton, and digital access keys, along with a GPIO interface.
2. Raspberry Pi:
This is a low cost credit card sized desktop computer that runs Linux but it also provides a set of GPIO (general purpose input/output) pins. It enables people to explore computing and learn Programming
3. Dstike Wi-Fi Duether :
Dstike can kick devices off a network irrespective of whether you are connected to it or not, it scans for nearby networks and selects individuals or networks it wants to kick out then kick it out
Flipper Zero is a toy-like portable hacking tool. The device is able to read, copy, and emulate RFID and NFC tags, radio remotes, iButton, and digital access keys, along with a GPIO interface.
2. Raspberry Pi:
This is a low cost credit card sized desktop computer that runs Linux but it also provides a set of GPIO (general purpose input/output) pins. It enables people to explore computing and learn Programming