Cerebro - E13's Knowledge Base
  • Knowledge Base
View page source Edit this page Create child page Create documentation issue Print entire section
On this page
  • Books/Guides
  • Definitions/Certifications
    • Attack/Threat Analysis
  • Tutorials/Videos

Basics

Fundamentals of information security

Preservation of confidentiality, integrity and availability (CIA).

Additional properties:

  • Non-repudiation
  • Authentication
  • Authorization

Books/Guides

  • Heather Adkins, Betsy Beyer, Paul Blankinship, Ana Oprea, Piotr Lewandowski, Adam Stubblefield (2020): Building Secure and Reliable Systems. O’Reilly Media
  • CNCF: Cloud Native Security Whitepaper Version 2
  • Ohio State University - Cybersecurity Canon
  • Google infrastructure security design overview

Definitions/Certifications

  • IT-Grundschutz-Kompendium
  • Cloud Computing Compliance Criteria Catalogue (C5)
  • RFC 2350 - Expectations for Computer Security Incident Response
  • European Cybersecurity Certification Scheme for Cloud Services (EUCS)

Attack/Threat Analysis

  • Threat Intelligence: written reports, indicators of compromise (IOC), malware reports
  • Cyber Kill Chains
  • Tactics, Techniques and Procedures (TTP)
    • ATT&CK framework (MIITRE)
  • OWASP Kubernetes Top 10

Tutorials/Videos

  • The Ultimate Guide to JWT Vulnerabilities and Attacks (with Exploitation Examples)
  • IppSec - Videos on pretty much everything infosec
© 2025 E13 Capital & Technology GmbHAll Rights Reserved