Free and Affordable Training with a focus on DFIR/Blue Team. Search only the free resources or search everything at once.
great site by DFIR Diva: Overview | LinkedIn
Free and Affordable Training with a focus on DFIR/Blue Team. Search only the free resources or search everything at once.
great site by DFIR Diva: Overview | LinkedIn
This is a great resource for those pursuing Microsoft certification.
Join our experts as they provide tips, tricks, and strategies for preparing for a Microsoft Certification exam. Our exam prep videos will help you identify the key knowledge and skills measured on the exam and how to allocate your study time. Each video segment corresponds to a major topic area on the exam. Our trainer will point out objectives that many test takers find difficult. In these videos, we include example questions and answers with explanations. We recommend that you watch these videos after you have completed training or had some practice. However, you can watch them at any point in your certification journey. We also provide additional exam preparation resources
Exam Readiness Zone | Microsoft Docs
Ever wonder what a Microsoft data center looks like i found this on the internet it is a great view and insight to data centers
The National Cybersecurity Center of Excellence (NCCoE) has
released a new draft project description, Mitigating
AI/ML Bias in Context: Establishing Practices for Testing, Evaluation,
Verification, and Validation of AI Systems. Publication of this
project description begins a process to solicit public comments for the project
requirements, scope, and hardware and software components for use in a
laboratory environment.
We want your feedback on this draft to help refine the project.
The comment period is now open and will close on September 16, 2022.
To tackle the complex problem of mitigating AI bias, this project
will adopt a comprehensive socio-technical approach to testing, evaluation,
verification, and validation (TEVV) of AI systems in context. This approach
will connect the technology to societal values in order to develop guidance for
recommended practices in deploying automated decision-making supported by AI/ML
systems. A small but novel part of this project will be to look at the
interplay between bias and cybersecurity and how they interact with each other.
The initial phase of the project will focus on a proof-of-concept
implementation for credit underwriting decisions in the financial services
sector. We intend to consider other application use cases, such as hiring and
school admissions, in the future. This project will result in a freely
available NIST SP 1800 Series Practice Guide.
Upcoming Workshop Update
Earlier this month, we announced a hybrid workshop on Mitigating AI
Bias in Context on Wednesday, August 31, 2022. The workshop will now
be virtual only via WebEx and will provide an opportunity to discuss this topic
and work towards finalizing this project description. You can register by
clicking on the above workshop link. We hope to see you there!
We Want to Hear from You!
The public comment period for this draft is open through September
16, 2022. See the publication details for a copy of the draft and
instructions for submitting comments.
We value and welcome your input and look forward to your comments.
NIST requests public comments on the initial public draft (ipd) of
NIST IR 8214B, Notes on Threshold
EdDSA/Schnorr Signatures.
This report considers signature schemes that are compatible with the
verification phase of the Edwards Curve Digital Signature Algorithm (EdDSA)
specified in Draft Federal Information Processing Standards (FIPS) publication
186-5. The report analyzes threshold schemes, where the private signing key is
secret-shared across multiple parties, and signatures can be produced without
the parties reconstructing the key. Security holds even if up to a threshold number
of parties has been compromised.
The report reviews the properties of EdDSA/Schnorr deterministic
and probabilistic signatures schemes, both in the conventional (non-threshold)
and threshold setting, summarizing various known properties and approaches.
These threshold signatures can allow for a drop-in replacement of conventional
signatures without changing the legacy code used for verification. This work is
useful to advance the NIST Multi-Party Threshold Cryptography project, which is
also interested in other primitives. The document suggests that it is
beneficial to further consult with the community of experts for security
formulations, technical descriptions, and reference implementations.
The report includes a section for each of the following:
The public comment period is open through October 24, 2022. See
the publication details for a copy of the draft and
instructions for submitting comments.
NOTE: A call for patent claims is included on page iii of this
draft. For additional information, see the Information Technology
Laboratory (ITL) Patent Policy – Inclusion of Patents in ITL Publications.
The Zero Trust Architecture (ZTA) team at NIST’s National Cybersecurity Center of Excellence (NCCoE) invites
public comments on volumes C-D of a preliminary draft practice guide “Implementing a Zero Trust Architecture”. This guide
summarizes how the NCCoE and its collaborators are using commercially available
technology to build interoperable, open standards-based ZTA example
implementations that align to the concepts and principles in NIST Special
Publication (SP) 800-207, Zero Trust Architecture. As the project progresses,
the preliminary draft will be updated, and additional volumes will also be
released for comment.
As an enterprise’s data and resources have become distributed
across the on-premises environment and multiple clouds, protecting them has
become increasingly challenging. Many users need access from anywhere, at any
time, from any device. The NCCoE is addressing these challenges by
collaborating with industry participants to demonstrate several approaches to a
zero trust architecture applied to a conventional, general purpose
enterprise IT infrastructure on premises and in the cloud.
We Want to Hear from You!
The NCCoE is making volumes C-D available as a preliminary draft
for public comment while work continues on the project. Review the preliminary
draft and submit comments online on or before September 9, 2022.
We welcome your input and look forward to your comments. We invite
you to join nccoe-zta-coi@list.nist.gov to receive
news and updates about this project.
– Zero Trust Architecture Project Team
The PNT cybersecurity profile is part of NIST’s response to the
February 12, 2020, Executive Order (EO) 13905, Strengthening National Resilience Through
Responsible Use of Positioning, Navigation, and Timing Services. The
EO notes that “the widespread adoption of PNT services means disruption or
manipulation of these services could adversely affect U.S. national and
economic security. To strengthen national resilience, the Federal Government
must foster the responsible use of PNT services by critical infrastructure
owners and operators.” The Order also calls for updates to the profile every
two years or on an as needed basis.
Based on NIST’s interaction with public and private sector
stakeholders and their efforts to create “sector specific” profiles, it was
decided to create Revision 1. No substantive changes were made to the original
Foundational Profile; NIST is only seeking comments on the changes made in this
Revision. Among the most noteworthy are: the addition of five new Cybersecurity
Framework (CSF) Subcategories, and the addition of two appendices; Appendix D;
Applying the PNT Profile to Cybersecurity Risk Management, and Appendix E;
Organization Specific PNT Profiles.
All changes are captured in Table 26: “Change Log” for easy
reference to reviewers.
The PNT Profile was created by applying the NIST CSF to help
organizations:
Organizations may continue to use this profile as a starting point
to apply their own unique mission, business environment, and technologies to
create or refine a security program that will include the responsible use of
PNT services.
The National Cybersecurity Center of Excellence (NCCoE) has
released a new draft project description, Software Supply Chain and DevOps Security
Practices: Implementing a Risk-Based Approach to DevSecOps.
Publication of this project description begins a process to solicit public
comments for the project requirements, scope, and hardware and software
components for use in a laboratory environment.
We want your feedback on this draft to help refine the project.
The comment period is now open and will close on August 22, 2022.
The project will focus initially on developing and documenting an
applied risk-based approach and recommendations for secure DevOps and software
supply chain practices consistent with the Secure Software Development
Framework (SSDF), Cybersecurity Supply Chain Risk Management (C-SCRM), and
other NIST, government, and industry guidance. This project will apply these
practices in proof-of-concept use case scenarios that are each specific to a
technology, programming language, and industry sector. Both commercial and open
source technology will be used to demonstrate the use cases. This project will
result in a freely available NIST Cybersecurity Practice Guide.
We Want to Hear from You!
Review the project description and submit comments online on or
before August 22, 2022. You can also help shape and contribute to this project
by joining the NCCoE’s DevSecOps Community of Interest. Send an email to devsecops-nist@nist.gov detailing your
interest.
We value and welcome your input and look forward to your comments.
The initial public draft of NIST Special Publication (SP) 800-66r2
(Revision 2), Implementing the
Health Insurance Portability and Accountability Act (HIPAA) Security Rule: A
Cybersecurity Resource Guide, is now available for public comment.
The HIPAA Security Rule specifically focuses on protecting the
confidentiality, integrity, and availability of electronic protected health
information (ePHI), as defined by the Security Rule. All HIPAA-regulated
entities must comply with the requirements of the Security Rule.
This draft update:
A public comment period is open
through September 21, 2022. See the publication
details for a copy of the draft and instructions for submitting
comments.
NOTE:
A call for patent claims is included on page v of this draft. For additional
information, see the Information
Technology Laboratory (ITL) Patent Policy – Inclusion of Patents in ITL
Publications.
Comment Period Extended
for NIST SP 1800-34, Validating the Integrity of Computing Devices
The National Cybersecurity Center of Excellence (NCCoE) has
published, for public comment, a draft of NIST SP 1800-34, Validating the
Integrity of Computing Devices. Please download the document and share your
expertise with us to strengthen the draft practice guide. The public
comment period for this draft has been extended and will now close on August 8th,
2022.
The NCCoE relies on developers, providers, and users of
cybersecurity technology and information to provide comments on our practice
guides. The public is encouraged to review the draft and provide feedback for
possible incorporation into the final version before the public comment period
closes.
If you have any questions or would like to join our Supply Chain
Community of Interest, please email us at supplychain-nccoe@nist.gov.