(Part 2) Best products from r/cybersecurity
We found 21 comments on r/cybersecurity discussing the most recommended products. We ran sentiment analysis on each of these comments to determine how redditors feel about different products. We found 56 products and ranked them based on the amount of positive reactions they received. Here are the products ranked 21-40. You can also go back to the previous section.
21. Mathematics 1001: Absolutely Everything That Matters in Mathematics in 1001 Bite-Sized Explanations
- 12 HOURS HOT / 24 HOURS COLD. Peak insulating performance thanks to innovative triple walled design
- 20% LIGHTER than competitors! Bottle weighs just 12.7 oz (360 g) so it’ll never slow you down
- NO SWEAT, NO LEAKS. Leak-proof lid and vacuum insulation technology means all liquid stays inside your ultralight bottle
- SCRATCH-RESISTANT FOOD GRADE STEEL. Bottle never retains odor or flavor and extra-durable powder coated finish stands up to drops, scratches and impacts
- 100% SATISFACTION GUARANTEED - Bear Grylls Gear is backed by a limited lifetime warranty
Features:
23. CCNA Cyber Ops (SECFND #210-250 and SECOPS #210-255) Official Cert Guide Library
25. Craft of System Security, The
- Colorful sneaker featuring lace-up vamp and logoed pull at padded tongue
Features:
26. Offensive Countermeasures
- 7 3watt LEDs running at 2watt each
- 2 Neutral White 6500k : 1 Cool White 12000k : 3 Royal Blue 455nm : 1 True Violet 420nm
- 60 Degree Optics
- Standard US e26/27 screw in base
- Covers approx. 12" x 12" spread of light
Features:
27. CompTIA Security+ Get Certified Get Ahead: SY0-501 Study Guide
- HIGH QUALITY MICROFIBER CLOTHS ⭆ The pack includes 5 (12 x 12 inches) extra large microfiber cloths. The very fine fibers of the cloth is perfect to pick up grease and dirt.
- PERFECT for DELICATE SURFACES ⭆ The soft material is highly recommended and safe for all surfaces. Ordinary cloths tend to just push the dirt towards the edges. These cloths are made of high quality microfiber that can lift the dirt off a surface for that clean and smooth finish.
- GENEROUS SIZE ⭆ These cloths are large enough to clean wide screen TVs, large computer monitors and LCD screens. Each microfiber cleaning cloth can also be used to quickly remove fingerprints, dust and smudges from the screen of your phone, tablet, TV, notebook or desktop computer screen.
- SCRATCH-FREE CLEANING ⭆ You can use each cloth to wipe away the dust and dirt without worrying about any damaging scratches. The extremely gentle fine microfiber leaves zero streaks or marks.
- RE-USABLE and LONG LASTING ⭆ These cloths can be used repeatedly. You’ll save money and cut down on household waste. You can wash them by hand or machine, but avoid ironing or bleaching.
Features:
28. Faraday Bag, Wisdompro RFID Signal Blocking Bag Shielding Pouch Wallet Case for Cell Phone Privacy Protection and Car Key FOB (Black)
- Protects chip technology "smart-cards" from hackers' RFID readers in the range of 10 MHz - 3 GHz
- Convenient and portable - inner silver layer blocks signals, outer Oxford cloth black layer can be used as a normal case - a modern and fashionable design
- Block Cell Phone Signal - If you don't want to answer the phone, you can put the phone in the silver layer pocket of the bag and close it, then the phone will be disconnected; this bag can also block Cell Phone GPS Signal to prevent tracking, protect your privacy
- Block Car-key FOB Signal - Keep your car's security system from getting hacked
- Compatible Size: 7-1/2" x 3-1/2" (19 x 8.9 cm) - Fits Car-key FOB, Smart Phones like Apple iPhone Xs, iPhone Xs Max, iPhone XR, iPhone X, iPhone 8, iPhone 8 Plus, iPhone 7, iPhone 7 Plus, iPhone 6/6s, iPhone 6 Plus/6s Plus, iPhone 5/5s/5c, iPhone SE; Samsung Galaxy S7/S7Edge, Galaxy S6/6 Edge, Galaxy S5, Galaxy S4, Galaxy Note 5, Note 4,Note 3; HTC One, One 2 (M8); Motorola Droid; LG Optimus and More (with or without slim case)
Features:
29. CISSP (ISC)2 Certified Information Systems Security Professional Official Study Guide
- Sybex
Features:
32. Cybersecurity for Beginners
- Dimensions:Length 4 inch X Width 4inch X Height 8 inch
- Handmade from Indian rosewood which has a naturally beautiful brown shade. Rosewood is also known to be durable and lightweight.
- Enhanced further with brass inlay it has a brass coin slot on the top, you can easily retrieve the coins when required by opening its lid.
- Store that odd coin lying around in your home or pocket, this coin box is quite tall so it will take quite some time before your amass a huge collection.
- A valuable gift for kids to teach them the importance of saving money in a concrete manner.
Features:
33. CompTIA Security+ SYO-401 Exam Cram (4th Edition)
- The eye makeup and improve eye brow mascara
- Technical brush resistant to scalp to brow liquid firmly adopted
- Even a lick of paint and color sweat, water, sebum and rubbing are prescribing strong, long-lasting for a long time
Features:
35. SharkTap Network Sniffer
- The SharkTap is a special purpose 10/100Base-T ethernet switch that allows you to 'tap into' an ethernet connection. It is intended to be used with the open source Wireshark network analyzer or equivalent.
- Conventional switches route packets only to the intended destination port, reducing traffic, but preventing a third port from seeing all packets. The SharkTap sends a copy of all packets on the 'NETWORK' ports to the 'TAP' port.
- Powered from a micro-USB cable (included), draws 250mA or less.
- Other features: Passive technology will not alter NETWORK traffic, even with power off.
Features:
36. Ubiquiti UniFi Switch 8 60W (US-8-60W),White
- The US-8-60W is an 8-port gigabit switch with four 802.3af PoE ports. Its auto-sensing PoE ports deliver up to 15.4W of power per port
- Product dimensions – 5.83” L x 1.21” W x 3.92” H | Ports quantity – 8 | Background noise level – 27.5 dB | Power method – 48VDC, Max. 2A | Weight – 15.24 Oz. | Max power consumption – 12W | Operating temperature – 23 to 113° F
- The new 8-port models feature Gigabit Ethernet ports in a compact form factor
- The UniFi Switch offers the forwarding capacity to simultaneously process traffic on all ports at line rate without any packet loss, with a switching capacity of 16 Gbps
- A single instance of the UniFi Controller running in the cloud can manage multiple UniFi sites within a centralized interface. Each site is logically separated and has its own network monitoring, configuration, maps, statistics, and admin accounts
Features:
38. Practice Lock Set 9 pcs Transparent Locks
Very easy to useStainless steel materialDurable Home Repair Tool Set KitShip from USAVery fast to you
39. Blue Team Field Manual (BTFM) (RTFM)
- A Good Smile import
- From the popular anime series
- Includes three face plates for multiple expressions
- Includes P90 weapon p-chan and shooting effect parts
- Two VZ61 submachine guns and combat knife
Features:
40. Blue Team Handbook: SOC, SIEM, and Threat Hunting (V1.02): A Condensed Guide for the Security Operations Team and Threat Hunter
- Adjustable black 17mm resin strap fits up to 8-inch wrist circumference
- 100-hour chronograph with 10-lap memory; 24-hour countdown timer
- customizable alarm; 24-hour military time mode; 2 time zones; day, date & month calendar
- Black 42mm resin case with acrylic lens; gray digital display; Indiglo light-up watch dial
- Water resistant to 100m (330ft): in general, suitable for swimming and snorkeling, but not diving
Features:
Not really.
Maybe for the weeder general ed classes. But, largely no. Business calculus is about as advanced as it will get unless you go the engineer route and need differential equations.
Cryptography is largely about implementation in cybersecurity. The people that do the math proofs on cryptographic equations are largely mathematics Ph.Ds. Like, Emeritus professors at Ivy league schools.
​
In defense of math, I didn't realize how useful and, dare I say, fun, largely because it is valuable at making money. Mathematics 1001: Absolutely Everything That Matters in Mathematics in 1001 Bite-Sized Explanations - I wish I had this book in 3rd grade. Would have made life much easier and more productive.
​
If you don't like math, try putting a dollar sign in front of things.
https://objective-see.com
This is a good start in general. But for a 101 on Mac security & forensics, I very much suggest taking the SANS 518 course (Mac and iOS Forensic Analysis and Incident Response). It’s updated routinely and over all a great course.
The teacher of the course, Sarah Edwards has a site on the subject too. https://www.mac4n6.com
A good book, and one that’s also used in the class: “OS X Incident Response: Scripting and Analysis
1st Edition” https://www.amazon.com/OS-Incident-Response-Scripting-Analysis-ebook/dp/B01FHOHHVS
Seems like it supports port mirroring, though I have zero experience with this line of Netgear switches. As for the firewall, that's something found on routers rather than switches, as they generally serve a different purpose.
If you've got the money to spare, you might want to pick up the books for Cisco's CCNA Cyber Ops, and consider writing the exam in future. It'll help cement a base of knowledge and look great on a resume.
I'm not sure how it works to specialize your practice, but you might want to pickup the Tallin Manuals: https://smile.amazon.com/Tallinn-Manual-International-Applicable-Warfare/dp/1107613779/ref=smi_www_rco2_go_smi_g3905707922?_encoding=UTF8&%2AVersion%2A=1&%2Aentries%2A=0&ie=UTF8
You probably don't need industry certifications to successfully practice law with a focus in cyber, but then again idk how practicing law actually works. Might have more success asking in one of the lawerly subreddits.
The got my doctorate in cyber security in 2015. I was focused on system hardening and found this book and loved it. "The Craft of System Security" https://www.amazon.com/dp/0321434838/ref=cm_sw_r_cp_awdb_BpfKzbD3VNX2X
Although "security through obscurity" by itself is not useful. The book Offensive Countermeasures: The Art of Active Defense by Strand, John; Asadoorian, Paul; Donnelly, Benjamin; Galbraith, Bryce; and Robish, Ethan argues effectively that security through obfuscation can be useful when combined with monitoring and detection.
I think you will gain a lot of helpful info and concepts from the networking parts of the semester. I help you prepare, I'd suggest looking into studying for the Security+ exam. Below is a great book you can use to study and it has many extras like audio files, flash cards, etc that you need to pay for but very affordable.
https://www.amazon.com/CompTIA-Security-Get-Certified-Ahead-ebook/dp/B07652KDXM/ref=sr_1_3?ie=UTF8&qid=1539612596&sr=8-3&keywords=security%2B
I'd recommend getting a Faraday bag and keeping the phone in it the whole time you are there.
You can find them pretty cheap on Amazon: link
The CISSP is the gold standard for cyber security certifications. To qualify for the full cert, you need 5 years of experience in at least two distinct areas of the field. Otherwise, passing the test grants you "associate" certification.
The guys that I work with (who have 10 years in the field) took a two week bootcamp and then studied nonstop for a month before they took the test- they took a week off of work at the end to do nothing but study. They said it's the most challenging certification they have had to take. in the field.
It is NOT something that you can take a 5 day bootcamp and breeze through with no experience at all. The study guide is more than 1000 pages long.
There are a wealth of places you can get started. But if you're starting out with the goal of passing the CISSP right away with no prior experience, you're going to be drinking out of a firehose of information. Be ready for that.
These are technical committees that have been working in various topic areas for decades. For any of these areas you will find they have a related annual conference (often a journal too) and if you want to know more you can simply read some past papers, or attend the conference.
You will find all the top academics in the world in most of these topic areas are involved with IFIP TC11. For example, at TC11 this year the following people attended (amongst many many others)
Prof Ravi Sandhu (The guy who came up with role-based access control)
Prof Matt Bishop ( https://www.amazon.com/Computer-Security-2nd-Matt-Bishop/dp/0321712331/ref=sr_1_1?crid=L0S40U3N0435&keywords=matt+bishop+computer+security&qid=1569307692&sprefix=matt+bis%2Caps%2C256&sr=8-1 )
Prof Steven Furnell, Prof Gurpreet Dhillon, Prof Johan van Niekerk
These are the people who wrote the ACM / IEEE 's CSEC2017 curriculum. All of them are great to chat to and network with.
I’m currently reading this book, and would highly recommend. It tackles the questions you’re talking about and champions a more empirical approach.
https://www.amazon.com/How-Measure-Anything-Cybersecurity-Risk/dp/1536669741
Since no one gave you a decent answer..
Sounds like you want to download illegal data which can infect your computer. To prevent this, download VMWare and run a virtual OS (Linux, Windows..) which is practically air-gapped from the host machine and can be easily restored using snapshots. So research virtualization. Use secure passwords (Long, non-repeating) on your BIOS, user account, phone, individual website accounts etc. Check out [this] (https://www.deseat.me/), [this] (https://haveibeenpwned.com/) and maybe even a [book] (https://www.amazon.com/Cybersecurity-Beginners-Raef-Meeuwisse/dp/1483431231). Finally, research phishing so you do not do things like click on links without hovering over them or send personal info to the wrong people. Turn on Windows Defender (if willing to spend money, buy AV software like Malware Bytes). That is pretty much the basics of self defense...
Referring to Security+ books. I like the Security+ ExamCram (https://www.amazon.com/CompTIA-Security-SYO-401-Exam-Cram/dp/0789753340/ref=sr_1_7?ie=UTF8&qid=1520956323&sr=8-7&keywords=security%2B+401) a lot better than All in One Comptia Security+ (https://www.amazon.com/CompTIA-Security-Guide-Fourth-SY0-401/dp/0071841245/ref=sr_1_4?ie=UTF8&qid=1520956323&sr=8-4&keywords=security%2B+401)
Cool! That's a good one. Also really thought this was good.
Here is a decently nice set with a clear learning lock (see through).
https://www.amazon.com/dp/B07YH23191/ref=cm_sw_r_cp_api_i_k9i0DbQD1SV7W
Here is a 9 piece test lock setup.
https://www.amazon.com/dp/B07XV2T3BY/ref=cm_sw_r_cp_api_i_6aj0DbY87XS39
This is a tubular picking set.
https://www.amazon.com/dp/B07S8VXR89/ref=cm_sw_r_cp_api_i_cdj0DbD4Y4X27
There are plenty of books and videos online for him to learn from.
I'd be very surprised if you haven't heard or got these given your certs! Either way highly recommend the Blue Team Field Manual and Red Team Field Manual
The best: https://www.amazon.com/Blue-Team-Handbook-Condensed-Operations/dp/1091493898