Free Online Cyber Security Training

With the Thanksgiving holiday going on, we took a bit of time off to focus on our families. We are still here, however, and still working on bringing you excellent training spanning all the fields that you need to be a well-rounded partisan. While others are fighting over TVs and brawling in the store aisles, you can sit back and get some much-needed free online cyber security training right there on your couch—including CompTIA certification. Think about that. Free online cyber security training.

Cybrary.it is billed as the “world’s first free and open, online Cyber Security and IT training platform.” They believe cyber security and IT training should be free to all, and they offer entire courses in some pretty critical fields. The following list is JUST their Cyber Security Learning track (they have others as well):

  • CompTIA Security+ – In this class you will gain a stable foundation of Cyber Security and Information Assurance as well as prepare for the security industry’s most sought after entry level certification.

  • Cryptography – Learn how to secure data communications through the use of cryptographic messaging and practices.

  • Ethical Hacking and Penetration Testing – Learn the fundamentals of hacking and penetration testing. Think like a hacker, so that you can stop them from intruding into your systems. This class will help prepare you for the industries most sought after certification, EC-Council’s CEH.

  • Computer and Hacking Forensics – In order to catch cyber criminals, you have to learn how to retrace their steps and correctly acquire and document the evidence. Also prepare for the industry leading CHFI certification from the EC-Council.

  • CompTIA Advanced Security Practitioner (CASP) – This advanced certification covers deep topics that span across both Cyber Security as well as Information Assurance.

  • ISACA Certified Information Systems Auditor (CISA) – Become an expert in information systems auditing and controlling with this leading auditor certification from ISACA.

  • Certified Information Systems Security Professional (CISSP) – The leading certification for Information Assurance management personnel. This course is both very deep, and very broad. Be ready to study hard!

  • Post Exploitation – Learn what to do to maintain your presence and to gather intelligence after you have exploited the target system.

  • Social Engineering and Manipulation – Take a look inside the form, function and flow of a highly skilled social engineering cyber-attack. Learn to protect the human element.

  • Python for Security Professionals – Learn the commands and functions that every aspiring cyber security professional must know from Python. This isn’t a full programming course, but rather a course designed for non-coders who are developing their career in security.

  • Metasploit – An in-depth look inside the Metasploit Framework intended to show you how to use it to its full potential.

  • Malware Analysis and Reverse Engineering – An introduction to reverse engineering malware. This class is for experienced Cyber Security professionals, generally at least two to three years in the field is preferred.

  • Advanced Penetration Testing by Georgia Weidman – This class is for advanced Cyber Security professionals. You will learn in depth, hands-on, advanced hacking techniques to help you target and penetrate almost any highly secured environment.

What does all that mean? It means that you can start at the beginning, and get walked through all the way to advanced skills, including certification, for free (all you pay for is the certification exam if you choose to get certified). It means you no longer have an excuse to not know at least the basics of things like cyber security, social engineering, encryption, and other topics. If nothing else, take the Social Engineering and Manipulation course.  These are skills used against us every day. Learn how to defend against them…or use them yourself.

This weekend while you’re laying around stuffed on turkey leftovers, take a look at Cybrary.it and what they have to offer.

Perspectives on Being the Gray Man

You may have heard the phrase “be the gray man.” Take a seat in a mall, a fast-food restaurant, even a sidewalk bench on a busy street. Look around at the people in the area. How are they dressed? How do they act? What stands out in that particular area? The area you’re in does matter when you’re deciding what’s “gray”; what stands out in Beverly Hills might be completely normal and grey in a small Midwest town. What passes for straight up crazy and even uncomfortable where I’m from in the American Heartland is perfectly normal and even expected in the freakshow of Seattle. Being the grey man is part skill and part art. It’s a behavior pattern that can save your life and that of your family in SHTF, and for those engaged in patriot activities it is a lifestyle that you should be practicing every day.

If this is a new concept to you, take a look at the links in this article. One of the best how-to guides for getting started is by a former counterintelligence agent (in fact, you should be adding his site to your daily or weekly reading list).

In order to stay off the radar of others, whether you’re an undercover secret agent or just trying to get through a bad neighborhood, you need to be the person who doesn’t trigger anything in the thought process of others. We call that person the Gray Man. He is invisible. It’s not that he doesn’t exist or interact with people though. He can walk through a crowd, take note of everything he wants, complete his mission or walk through an area and be out without anyone remembering he was there.

He doesn’t just wear clothes that match what everyone else is wearing, he wears clothes no one will take note of. He doesn’t just do things to fit his natural surroundings, he does things that don’t cause your mind to take notice. He had no color, no smell, no texture, no emotion. He wasn’t there.

There are plenty of articles on how to do this effectively, one of them being what I just quoted. A member of the Zombie Squad also penned a pretty decent how-to that will at least get you started thinking about the mindset necessary. It can be difficult to fade into the gray, especially for people with loud, boisterous personalities, a need for attention, a tendency to stand out, or even distinctive tattoos or scars. Some traits lend themselves well to adopting the gray man lifestyle; some, not so much.

The best tutorial I’ve seen so far is this gem over at ITS Tactical, which explains the psychology behind the whole thing and includes an exercise for training your mind to see the grey men that are already around you. Once you know how to spot them, you can be them.

To learn to see the previously invisible gray man, go to a public area with lots of foot traffic. Sit back and watch the crowd. As a person walks by, notice the stimulus that drew your eye. In your mind (not out loud), create an insult about that person’s stimulus. The more outlandish the better. Before you all get offended here, the purpose is to pound into your consciousness the stimulus – what you notice about each person. “That guy has a huge nose.” “That guy has completely bizarre taste in shoes” “Do they sell men’s clothes where he bought those pants?” “Wow. That almost looks like he got dressed in the dark.” Remember your purpose is to identify the stimulus.

Then after a few minutes, someone will walk by and you will not find anything. Nothing to make fun of, nothing to ridicule. Pay attention to that person. Observe them carefully. See how they move, what kind of energy they project. See how they interact with others, what they pay attention to (or not). If possible follow them for a bit. Observe them move. I am sure from having done this myself and observing as classes do this, that the key to becoming a gray man lies in your ability to observe and mimic.

One specific and somewhat impressive trick comes from a tiny little blog started a few months ago by a group of vets and active duty military. They’re called Cohort One Five, and one of their first posts back in June mentioned one way to get your gear from one place to the other while being the grey man.

A possible option for a low profile, covert, gun and gear case is the field hockey bag. Most can be had for under $100. While these bags are not designed specifically to hold a rifle and associated gear, it would not be difficult to modify it in order to do so…[Many] would fit a 16″ carbine and associated gear quite nicely. A couple of the larger ones might even fit a full length rifle.

We talk a lot here about minimizing your online footprint. Minimizing your physical footprint and not drawing attention to yourself is just as important—and being able to spot the people around you who are gray is critical as well.

Community Defense & the Elements of Soft Power

In case you haven’t already read it, there’s an excellent article up at Guerrillamerica regarding how to leverage something called soft power through influence and persuasion.

For individuals and communities preparing for a future that incorporates violence and morally ambiguous situations, to omit developing soft power is an unwise move. We can imagine lots of realistic scenarios in which soft power will enable us to achieve or maintain security: gaining the trust of community members to contribute to the security effort, working with local authorities to fight known threats, sharing information with neighboring communities and security groups, and persuading at-risk segments of a community to not support threat elements.

How can we develop soft power as a part of community defense? First, focus on your reputation. There are militias, security teams and prepper groups that have poor reputations, stemming from poor leadership, unrealistic, unethical or immoral goals, past indiscretions, and incompetence. When cooperation is a necessity for community defense, these groups are going to have a much more difficult time finding partners to push in the same direction. You don’t want to be a security partner of last resort with a team reluctant to work with you.

Read the whole thing.

Make Them Listen: A How-To Guide for Engaging Lawmakers

Guest post by Robert Arco, of The Common Truth.

One of the favorite “excuses” we hear from patriots and activists for inaction is the preconception that their elected officials don’t listen to them. In many ways, this axiom has been proven to be true as we have all had experience with the “deaf” elected who seem to decide for us. Part of the issue, however, is not the inability to listen but how the feedback is presented. If you go to a politician’s canned website and fill out a contact form, chances are pretty high that you are just noise, and the response will often be a form letter often directly opposite of what you stated.

There are better ways to deal with politicians but first you must understand your place in the grand scheme of constituency. These people receive hundreds, if not thousands of contacts each day depending on the level of office they hold. Using simple email is ineffective as they have staff who scans and replies on their behalf based on their already predetermined position. You are a lone voice in a sea of voices using a fairly ineffective medium of contact. It is similar to applying for a job at Boeing or Microsoft. They receive thousands of resumes every day and use screening software to weed through the volume. Less than 1% are even read by a human being and a smaller number acted on. The key is how to maximize contact and be noticed.

Continue reading “Make Them Listen: A How-To Guide for Engaging Lawmakers”

How to Set up a VPN on Kali Linux

One of the biggest issues that we as Patriots have is the need for secure communications. The way that we are used to communicating on the internet offers the federal government a full window into everything you do, say, buy, as well as everywhere you go and who you talk to. For those who are tired of that, there are options. The first is changing to an operating system that does not act as a data collection platform, like Windows does. Linux is the natural alternative for those looking to “clean up their act,” so to speak, and make a much smaller profile. Kali Linux is especially well-suited to security, having been built specifically for that purpose.

For those who are making the jump to Linux (and you SHOULD be), the next logical question is how to start operating a manner that’s more secure. Part of that discussion is setting up a VPN, or virtual private network. If you don’t understand how a VPN works, you can study up on that here. For now, we’ll assume that you’re familiar with what a VPN does, but perhaps you’re new to Linux and specifically Kali, and need a bit of guidance to get started. This guide is specifically for Private Internet Access, which I find to be one of the best ones on the market. Regardless of which VPN provider you use (TorGuard is another excellent one), this guide will work to get you the necessary setup for enabling VPN.

Continue reading “How to Set up a VPN on Kali Linux”