Cyber Security/Hacker Operating Systems
I was recently informed of a new operating system that helps cover all of the security needs for those working in the Cyber Security industry, by the name of Parrot OS. I’ll confirm now before letting you read on, I have migrated away from Kali to Parrot but during this journey I thought it was a good idea to see what other systems are out there for my security needs.
This blog article covers my discoveries, some of which may come as a complete surprise and others not so much.
The first two have already been mentioned, but here they are:
- Kali OS. https://www.kali.org/
This is the most popular Cyber Security operating system around, and there’s no surprise as to why. The security tool count, that is built in exceeds 600, and that is a lot to get your head around.
Add to this, the following certifications evolve around Kali, so for anyone wanting to get their careers moving in the direction of Cyber Security, this is a perfect choice.
Certifications: OSWE, OSCP, OSCE, OSWP, OSEE, KLCP.
Parrot OS is a relatively new solution brought to the industry, but it’s been done well. Just like Kali is has a wealth of tools but unlike Kali it has two major components prebuilt in, which are fantastic for all users, not just specific niches of the security industry. The first is the implementation of many tools to help keep you safe/anonymous online, and the second is all the default tools you require for performing documentation and office work. These brilliant additions are why the Parrot OS is also designed for Journalists and hacktavists, and not just the police or security professionals.
Quick summary, if I was asked which one to learn first. I’d still recommend Kali, but this is due to its history. It has been around long enough to have huge amounts of documentation and tutorials, which help people learn. However if you’ve been in the industry for a while now, I’d advise moving over to Parrot because it feels more natural and could be the future industry leader.
To find out more and discover the other cyber security operating systems you could explore, continue reading part 2 of this article at “mind of a raptor“.
Have you setup MS Office 365? Did you start with security in mind?
Have you reviewed your Security and privacy settings? Nothing is configured out of the box. When implementing o365, start treating the platform as if you were securing your On-Prem infrastructure.
Start with the basics:
- Password Policies
- Privacy Statements
Can you add additional security to users?
Have you enabled and enrolled users to use MFA? Is it Enfored MFA?
Has access been restricted?
Mobile Device Management, are you applying any controls to apps accessing OneDrive?
Has logging been enabled for the Office 365 Security and Compliance reports and stats
Stuart Barker ( The Data Security Guy) discusses data security and how it comes at a cost. There is a difference between being secure and demonstrating that you are secure. People often talk about ISO27001 certification as being needed for business to do business securely. It has its place but boy oh boy is certification going to cost. In this article Stuart Barker from Hight Table talks about how much does ISO 27001 actually cost and you might realise why companies don’t advertise it and you can’t google it and get a straight answer.
Deploying kubernetes on vSphere. Check out the options
If you’re struggling to deploy Kubernetes (k8s) clusters, you’re not alone. There are a bunch of different ways to deploy…
VMware Social Media Advocacy
Jan 16, 2020
AZ-103: Microsoft Azure ADMINISTRATOR
#Azure #Administrator #CertifiedProfessional #MicrosoftAzure #MicrosoftCloud #Microsoft #alwaysbelearning #AZ103 #EXAM #PASSED
Connecting a monitor to your laptop. Find the correct cable and port.
Next, dual-monitor, which screen is where? Any order would work but having the physical location match the logical location set on the computer is a next option.
Step 1. Right click any blank space on the desk top background > click display settings
Step 2. Under the “Select and rearrange displays” section, drag and drop each display to rearrange them according to their physical layout on your desktop.
(If you’re not sure which monitor you’re selecting, click the Identify button to figure out.)
Step 3. Click the Apply button.
Once you complete the steps, Windows 10 will save the physical layout, and you’ll be able to work across each display and run apps without issues.