Cybersecurity Procedures & Guides
Navigate complex cybersecurity tasks with our easy-to-follow, step-by-step procedures. From foundational setups to advanced assessments, these guides provide actionable insights.
Foundational Security Practices
Securing Your Home Wi-Fi Network
A comprehensive guide to configuring your wireless router for maximum security, including strong passwords, encryption, and guest networks.
Read GuideSetting Up a Secure Development Environment
Learn how to configure your workstation and tools to minimize security risks during software development.
Read GuideBasic Digital Hygiene Checklist
A practical checklist for individuals and small businesses to maintain fundamental cybersecurity health.
Read GuideVulnerability Management & Assessment
Performing a Basic Vulnerability Scan with Nmap
Walkthrough on using Nmap to identify potential vulnerabilities on your network and connected devices.
Read GuideUnderstanding CVEs and CVSS Scores
A guide to interpreting Common Vulnerabilities and Exposures (CVEs) and their Common Vulnerability Scoring System (CVSS) scores for prioritization.
Read GuidePatch Management Best Practices
Establish effective procedures for identifying, testing, and deploying security patches across your systems.
Read GuideIncident Preparedness & Response
Creating an Incident Response Plan Outline
A template and guide for drafting a basic incident response plan for your organization or personal use.
Read GuideSecurely Erasing Data from Drives
Procedures for ensuring sensitive data is completely and irrecoverably removed from storage devices.
Read GuideBasic Network Traffic Analysis with Wireshark
A guide to using Wireshark for initial investigation of suspicious network activity.
Read GuideHave a procedure you'd like to see covered or contribute?
Suggest a Procedure