  {"id":7,"date":"2015-07-27T14:40:36","date_gmt":"2015-07-27T14:40:36","guid":{"rendered":"https:\/\/www.saintpeters.edu\/cybersecurity\/facilities-and-resources\/"},"modified":"2024-11-06T17:06:25","modified_gmt":"2024-11-06T17:06:25","slug":"facilities-and-resources","status":"publish","type":"page","link":"https:\/\/www.saintpeters.edu\/cyber-security-center\/facilities-and-resources\/","title":{"rendered":"Facilities &#038; Resources"},"content":{"rendered":"<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.saintpeters.edu\/wp-content\/uploads\/blogs.dir\/249\/files\/2015\/07\/CyberClubSept2015-1024x576-1024x576.jpg\" alt=\"CyberClubSept2015\" width=\"1024\" height=\"576\" class=\"alignnone size-large wp-image-53\" \/>\r\n<h4>Software\/Technology<\/h4>\r\n<ul>\r\n<li>Department of Homeland Security Cyber Security Evaluation Toolkit<\/li>\r\n<li>SANS Investigative Forensics Toolkit (SIFT)<\/li>\r\n<li>Access Data Forensics Toolkit Imager<\/li>\r\n<li>OSForensics<\/li>\r\n<li>Autopsy Sleuthkit<\/li>\r\n<li>Hex Editor NEO<\/li>\r\n<li>Metasploit<\/li>\r\n<li>Nessus<\/li>\r\n<li>nmap<\/li>\r\n<li>CyberCiege<\/li>\r\n<li>Cyber Security and Ethical Hacking Computer Environments<\/li>\r\n<ul>\r\n\r\n&lt;!--<h4>Software<\/h4>\r\n<ul>\r\n    <li>HP WebInspect: Security Vulnerability<\/li>\r\n    <li>Microsoft SQL Server R2<\/li>\r\n    <li>Microsoft .NET Framework 4.0<\/li>\r\n    <li>IBM Security AppScan: Security Vulnerability<\/li>\r\n    <li>LogRhythm: Log Event and Management Analysis<\/li>\r\n    <li>CISCO Network Simulator<\/li>\r\n    <li>Department of Homeland Security Cyber Security Evaluation Tool Kit<\/li>\r\n<\/ul>\r\n<h4>Virtual Machines<\/h4>\r\n<ul>\r\n    <li>NETinVM: VMWare Virtual Machine Image that contains a series of User-Mode Linux Virtual Machines<\/li>\r\n    <li>Apache: Virtual Computing Lab<\/li>\r\n    <li>Virtual Box: Oracle Corporation<\/li>\r\n    <li>CISCO Virtual Labs and Simulators<\/li>\r\n    <li>SANS: Forensics Investigative Toolkit Workstation<\/li>\r\n<\/ul>\r\n<h4>Operating Systems<\/h4>\r\n<ul>\r\n    <li>Microsoft Windows 7<\/li>\r\n    <li>Linux<\/li>\r\n<\/ul>\r\n<h4>Network Sniffers<\/h4>\r\n<ul>\r\n    <li>SNORT<\/li>\r\n    <li>WireShark<\/li>\r\n    <li>Microsoft Network Monitor<\/li>\r\n<\/ul>--&gt;\r\n<\/br>\r\n<hr \/>\r\n<h3>Links &amp; Cyber Security News<\/h3>\r\n<div class=\"row\">\r\n<div class=\"six columns\">\r\n\r\n<p><a href=\"https:\/\/niccs.cisa.gov\/workforce-development\/nice-framework\" target=\"_blank\">NICE Framework<\/a><\/p>\r\n<p><a href=\"https:\/\/www.nist.gov\/cyberframework\" target=\"_blank\">NIST Framework<\/a><\/p>\r\n<p><a href=\"https:\/\/www.cyberseek.org\/\" target=\"_blank\">CyberSeek<\/a><\/p>\r\n<p><a href=\"https:\/\/www.stopthinkconnect.org\/\" target=\"_blank\">StopThinkConnect<\/a><\/p>\r\n<p><a href=\"https:\/\/www.getastra.com\/blog\/security-audit\/cyber-security-statistics\/\" target=\"_blank\">Cyber Stats<\/a><\/p>\r\n<p><a href=\"https:\/\/www.defense.gov\/News\/Tag\/47488\/cyber\/\" target=\"_blank\">U.S. Department of Defense News<\/a><\/p>\r\n<p><a href=\"https:\/\/www.usnews.com\/topics\/subjects\/cybersecurity\" target=\"_blank\">U.S. News<\/a><\/p>\r\n<p><a href=\"https:\/\/www.reuters.com\/technology\/cybersecurity\/\" target=\"_blank\">Reuters Cyber Security News<\/a><\/p>\r\n<p><a href=\"https:\/\/www.bbc.com\/news\/topics\/cz4pr2gd85qt\" target=\"_blank\">BBC Cyber Security News<\/a><\/p>\r\n<p><a href=\"https:\/\/www.cyber.nj.gov\/threat-landscape\/latest-alerts-and-advisories\" target=\"_blank\">NJ Cyber Security &amp; Communications Integration Cell News<\/a><\/p>\r\n<\/div>\r\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":2,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"footnotes":""},"class_list":["post-7","page","type-page","status-publish","hentry"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.saintpeters.edu\/cyber-security-center\/wp-json\/wp\/v2\/pages\/7","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.saintpeters.edu\/cyber-security-center\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.saintpeters.edu\/cyber-security-center\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.saintpeters.edu\/cyber-security-center\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.saintpeters.edu\/cyber-security-center\/wp-json\/wp\/v2\/comments?post=7"}],"version-history":[{"count":24,"href":"https:\/\/www.saintpeters.edu\/cyber-security-center\/wp-json\/wp\/v2\/pages\/7\/revisions"}],"predecessor-version":[{"id":298,"href":"https:\/\/www.saintpeters.edu\/cyber-security-center\/wp-json\/wp\/v2\/pages\/7\/revisions\/298"}],"wp:attachment":[{"href":"https:\/\/www.saintpeters.edu\/cyber-security-center\/wp-json\/wp\/v2\/media?parent=7"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}