Skip to content

bvoris/CollectiveWorks

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

34 Commits
 
 
 
 
 
 
 
 

Repository files navigation

CollectiveWorks

Collective works like articles, e-books, documents and collaborations I've written over the years.

GitHub GitHub commit activity GitHub All Releases GitHub repo size GitHub language count GitHub issues GitHub top language

Content

Blog

MY Professional Blog
https://bvoris.github.io/

Peerlyst - eBook Chapters

Intrusion Detection Guide - Peerlyst (Chapter 10 Compliance Frameworks)
https://github.com/bvoris/CollectiveWorks/blob/main/Collaborative/Intrusion_Detection_Guide.pdf

Essentials of Cybersecurity - Peerlyst (Chapter 8 Understanding Central Areas of Enterprise Defense)
https://github.com/bvoris/CollectiveWorks/blob/main/Collaborative/Peerlyst_eBook_2_-_Essentials_of_Cybersecurity.pdf

Misc Microsoft, LinkedIn, Peerlyst Publications

Active Directory_ migrating from 2003 to 2012 R2 enterprise multi-site single forest domain - TechNet Articles - United States (English) - TechNet Wiki.pdf
https://github.com/bvoris/CollectiveWorks/blob/main/Articles/Active%20Directory_%20migrating%20from%202003%20to%202012%20R2%20enterprise%20multi-site%20single%20forest%20domain%20-%20TechNet%20Articles%20-%20United%20States%20(English)%20-%20TechNet%20Wiki.pdf

IOT: The Dangers and Technical Security Challenges for the Internet Of Things
https://github.com/bvoris/CollectiveWorks/blob/main/Articles/IoT.docx.pdf

Mental Health Resource for Technology and Security Professionals - Peerlyst
https://github.com/bvoris/CollectiveWorks/blob/main/Articles/Mental%20Health%20Resource%20for%20Technology%20and%20Security%20Professionals.pdf

SettingContent-MS File Execution Vulnerability Exploit - Peerlyst
https://github.com/bvoris/CollectiveWorks/blob/main/Articles/SettingContent-MS%20File%20Execution%20Vulnerability%20Exploit.pdf

SettingContent-MS lets run PowerShell code and bypass the execution policy.pdf
https://github.com/bvoris/CollectiveWorks/blob/main/Articles/SettingContent-MS%20lets%20run%20PowerShell%20code%20and%20bypass%20the%20execution%20policy.pdf

Social Engineering - Information Gathering via Social Media and other online sources.pdf
https://github.com/bvoris/CollectiveWorks/blob/main/Articles/Social%20Engineering%20-%20Information%20Gathering%20via%20Social%20Media%20and%20other%20online%20sources.pdf

Building Better Queries in Shodan.io For Better Reporting
https://www.linkedin.com/pulse/building-better-queries-shodanio-reporting-brad-voris/

PowerShell Script Execution via Cmd.exe Relative Path PoC
https://www.linkedin.com/pulse/powershell-script-execution-via-cmdexe-relative-path-poc-brad-voris/

Security RSS Feeds
https://www.linkedin.com/pulse/security-rss-feeds-brad-voris/

If you don't take your own company's cyber security seriously, someone else will.
https://www.linkedin.com/pulse/you-dont-take-your-own-companys-cyber-security-seriously-brad-voris

HTTP Headers for the Security Professional
https://www.linkedin.com/pulse/http-headers-security-professional-brad-voris/

College Publications

Wilmington University: Strengthening National Security: Assessing the Adequacy of the U.S. Federal Government Efforts in Securing Public Infrastructure
https://github.com/bvoris/CollectiveWorks/blob/main/Articles/Strengthening%20National%20Security%20-%20%20Assessing%20the%20Adequacy%20of%20the%20U.S.%20Federal%20Government%20Efforts%20in%20Securing%20Public%20Infrastructure%20By%20Brad%20Voris.pdf

Collaborative Works

Covid-19 What Initiatives should your organization take from a cyber security perspective
By Monique Nicholson-Apatow
https://www.linkedin.com/pulse/covid-19-what-initiatives-should-your-organization-nicholson-apatow/

Ransomware: To pay or not to pay
By Kevin Kentner
https://www.linkedin.com/pulse/ransomware-pay-question-kevin-kentner-cissp/

Peer Review and Content Editor

Top Threats to Cloud Computing 2019 Report
https://cloudsecurityalliance.org/artifacts/top-threats-to-cloud-computing-egregious-eleven/?utm_source=linkedin

Complete Guide to Security Operation Center
https://github.com/bvoris/CollectiveWorks/blob/main/Collaborative/Complete-Guide-to-Cyber-Security-Operation-Center_v6.2_FINAL-pages-1.pdf
https://github.com/bvoris/CollectiveWorks/blob/main/Collaborative/Complete-Guide-to-Cyber-Security-Operation-Center_v6.2_FINAL-pages-2.pdf


Quotes and References

Cyber Warnings E-Magazine - How Windows Active Directory is the root cause of many logon security headaches
https://www.isdecisions.com/Resources/pdf/cyber-defense-magazine-ad-root-cause-problems-article.pdf

Featured in

Top Cyber News Magazine - December 2022
https://github.com/bvoris/CollectiveWorks/blob/main/Articles/Top%20Cyber%20News%20Magazine%20December%202022.pdf

Connect with me at





Victim Of Technology

Cyber Forge Security, Inc.

About

Complete written works by Brad Voris

Topics

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published