Rachel Jasurda

Hi, my name is Rachel; I'm a Cybersecurity Specialist and the founder of Cybersecurity Demystify. I enjoy learning and love helping others learn the easy way. Happy Learning!

Runbook Sample Template for Handling a Malware Infection Following the NIST 800-61 Guideline

This is a comprehensive runbook template for handling a malware infection following the NIST 800-61 guideline. This template serves as a strong foundation for a runbook to manage malware infections effectively, ensuring that your team can respond promptly and systematically. Click here to download the editable version of this Runbook Template. Feel free to customize […]

Runbook Sample Template for Handling a Malware Infection Following the NIST 800-61 Guideline Read More »

Step-by-Step Guide to Installing and Configuring OpenVAS in Kali Linux

What is OpenVAS? OpenVAS (Open Vulnerability Assessment System) is a leading free and open-source tool for vulnerability scanning and management, widely used by security professionals to identify and remediate vulnerabilities in their networks. In this guide, I will provide a comprehensive and easy step-by-step approach to installing and configuring OpenVAS on Kali Linux. Prerequisites Before

Step-by-Step Guide to Installing and Configuring OpenVAS in Kali Linux Read More »

Demystifying the MITRE ATT&CK Framework: A Comprehensive Guide

Mitre ATT&CK Framework Mitre ATT&CK, which stands for Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK), Is a comprehensive knowledge base that provides organizations with a detailed understanding of the tactics, techniques, and procedures (TTPs) used by cyber adversaries. It was developed by the Mitre Corporation, a non-profit organization that focuses on solving complex problems for

Demystifying the MITRE ATT&CK Framework: A Comprehensive Guide Read More »

How to Analyze Nessus Vulnerability Scan Result

Prerequisites There are prerequisites to this lab as listed below: Step-by-Step Guide on Installing Nessus Essentials Launch A Credentialed Scan in Nessus: Step-by-Step Guide How to Create and Launch a Basic Network Scan in Nessus How to Create and Launch a Host Discovery Scan in Nessus Understanding Nessus Vulnerability Assessment Nessus is a widely used

How to Analyze Nessus Vulnerability Scan Result Read More »

A Comprehensive Guide to Searching and Analyzing Data in Splunk using the Splunk Search App

Splunk Enterprise Splunk Enterprise is a Security Information & Event Management SIEM solution that allows you to manage your data in one place. By providing a user-friendly dashboard to collect, analyze, visualize, and manage your data. Click here to learn how to install Splunk Enterprise on Windows. Click here to learn How to Install a Windows

A Comprehensive Guide to Searching and Analyzing Data in Splunk using the Splunk Search App Read More »

Effective Incident Response: A Guide Based on NIST 800-61

Effective Incident Response: A Guide Based on NIST Framework In today’s digital landscape, the threat of cybersecurity incidents is ever-present. Organizations must make preparations and get ready to respond promptly and effectively, whether it’s a data breach, phishing attack, or malware infection. One of the most reliable resources for developing an incident response strategy is

Effective Incident Response: A Guide Based on NIST 800-61 Read More »

Incident Response Plan Sample for Malware Infection Based on NIST 800-61

Incident Response Plan Sample for Malware Infection Click here to download the editable version of this plan and modify it as needed to suit your organization’s needs. 1. Introduction Purpose This plan outlines the procedures to follow in the event of malware infection to minimize damage, recover systems, and prevent future incidents. Scope Applicable to

Incident Response Plan Sample for Malware Infection Based on NIST 800-61 Read More »

How to Enable TLS 1.3 on Windows Server 2022 With IIS Crypto

What is TLS 1.3? TLS 1.3, or Transport Layer Security version 1.3, is a cryptographic protocol created to provide secure communication over a network. It’s the latest version of TLS, which is the successor to SSL (Secure Sockets Layer). TLS Key Features include: Transport Layer Security (TLS) VS Secure Sockets Layer (SSL) TLS or Transport

How to Enable TLS 1.3 on Windows Server 2022 With IIS Crypto Read More »

Standard Operating Procedure (SOP) Sample and Editable Template for Installation of Antivirus Software

Here’s a comprehensive SOP template for the installation of antivirus software. Feel free to customize it to fit your organization’s specific requirements. Click here to download the editable template. Notes: Standard Operating Procedure (SOP) for Installation of Antivirus Software SOP Title: Installation of Antivirus Software SOP Number: [SOP-001] Effective Date: [Insert Date] Revision Number: [Revision

Standard Operating Procedure (SOP) Sample and Editable Template for Installation of Antivirus Software Read More »

How to Install a Windows Universal Forwarder: Step-by-Step Guide

Configure Receiving in Splunk Server Login to your Splunk Server. See how to install Splunk Enterprise here. Click on the Settings tab > Forwarding and receiving > Receive Data. Configure receiving, and click  Add new “Set up this Splunk instance to receive data from forwarder(s).” The spunk instance listens on port 9997 to receive data

How to Install a Windows Universal Forwarder: Step-by-Step Guide Read More »

CHAT