Cybersecurity Training | Blue Team

This collection of documents focuses on certifications and training related to cybersecurity, particularly within the context of deploying, operating, and monitoring the Qualys cloud platform. It emphasizes professional qualifications for IT specialists and includes discussions on security vulnerabilities, threat detection, red and blue team exercises, and the integration of offensive and defensive cybersecurity strategies. Additionally, there are presentations on tools and methodologies designed to enhance security practices and incident response.

AWS Community Fest Peru 2025: De attacker a defender, Pentesting en Kubernetes con AWS Security Services
Pentesting Kubernetes con AWS EKS GuardDuty Detective ECR e Inspector
Can_We_Really_Detect_These_So_Called_Sophisticated_Attacks?
Using a WAF to Make the Life of Bug Bounty Hunters Miserable
Introduzione all'Event Log Analysis per Blue Team | Nexsys
My InfoSec journey led me to create my own IR tools, how, and why you should too
Ethical Hacking - Red Team vs Blue Team.pptx
Purple Team - Offensive and Defensive collaborative simulation
Sophisticated Attacks - Can We Really Detect Them _v1.2.pdf
Segurança da Informação - Onde estou e para onde eu vou.pptx
Subdomain enumeration is a crucial phase in cybersecurity, particularly during reconnaissance and vulnerability assessment processes.
TOP 100 Vulnerabilities Step-by-Step Guide Handbook
Qualysguard Policy Compliance 04102023.pdf
CyberSecurity Asset Management 01222024.pdf
Qualys Patch Management Response 01082024.pdf
Qualys Reporting Strategies & Best Practices 01032024.pdf
Qualys Scanning Strategies & Best Practices 12272023.pdf
Qualys Vulnerability Management 05072023.pdf
Qualys Vulnerability Management Detection Response 02282023.pdf
Incident Response Fails