Kernel of Truth
Acronyms
Azure vs AWS Security Services – Side-by-Side Comparison
Beaconing Detection with Splunk
Breach and Attack Simulation
C2 Server – Command and Control in Cybersecurity
Chain of Custody Procedures
CI/CD and integrating security into pipelines (DevSecOps)
CIA Triad
Cloud Access Security Broker (CASB)
Common Attack Types
Common Cybersecurity Misconceptions That Put You at Risk
Cryptography Essentials
Cyber Defence Team Programs
Insider Risk
Threat Intelligence
Cyber Essentials Plus (CE+)
Cyber Kill Chain
Cyber Security Tech You Should Know
Deobfuscate a PowerShell Script with Example
File Analysis
Packet Analysis
Quantum Computing Threats
Scripting Languages in Cybersecurity
SPF, DKIM, and DMARC
Top 50 Nmap Commands
Top Cybersecurity Tools to Learn in 2025
Well-Known TCP & UDP Ports (0–1023)
What Is a Firewall?
Cybersecurity Best Practices
Cybersecurity Careers
Amazon Leadership Principles
AWS Fundamentals for Cybersecurity Engineers
Azure Fundamentals for Cybersecurity Engineers
Cyber Security Engineer Certifications
Cybersecurity Career Paths
Mentoring
S.T.A.R. technique
Security Engineer Tiers
SOC Analyst Tiers
DAST – Dynamic Application Security Testing
Data Loss Prevention (DLP)
Detection Engineering 101
DORA – Digital Operational Resilience Act
Endpoint Detection & Response (EDR)
Evaluating and Uplifting an Organisation’s Cybersecurity Posture: My Approach
Free Cyber Security Tools
Home Labs
Cybersecurity Home Lab – Advanced
Cybersecurity Home Lab – Beginner
Cybersecurity Home Lab – Intermediate
How to Conduct a Post-Incident Review (PIR)
IP Address Ranges
ISO 27001 Controls Breakdown
Listings
Log Analysis
MDR (Managed Detection & Response)
MITRE ATT&CK Framework
NHS Data Security and Protection Toolkit (DSPT)
NIS2 – Network and Information Security Directive 2
NIST Cybersecurity Framework (NIST CSF)
NIST SP 800-61 incident response planning.
Phishing Link Clicked – NIST 800-61 Response
PKI – what is it?
Playbook
Playbook vs Runbook vs Workflow
Red, Blue & Purple Teams
Blue Team
Purple Team
Red Team
Runbook
SAST – Static Application Security Testing
Security Information and Event Management (SIEM)
Security Orchestration, Automation, and Response (SOAR)
SOAR Automation Examples
SOC 1 vs SOC 2 – Security & Compliance Frameworks
Threat Hunting
Threat Intelligence (TI)
Top 10 OWASP
Welcome to Kernel of Truth
What is the Difference Between Hashing and Encryption?
Windows 11 Sandbox error 0x80070103
Workflows in Cybersecurity
XDR (Extended Detection & Response)
Home Labs
Beginner
Intermediate
Advanced