⭐️ Objectives & Purpose of Cyber Judo:
- To provide high-quality free information security training and insight based on real-world and practical experience.
- To provide helpful information security career-building skills, tips, and tricks to help new folks get their foot in the door.
- Elaborate and discuss specific security testing processes, techniques, tools, and exercises.
- Building easy-to-understand, free-to-distribute, and insightful training content.
- Deliver insightful training content in an engaging, conversational, and fun format rather than dry lectures.
- Encouraging mutual learning via open discussion, respectful debates, and collaboration.
⚖️ Important House Rules:
- Do not come to sell your product, solution, service, offering or anything like that, this is not the place.
- Be yourself and have fun, but be sure to maintain an environment that is conducive to taking real value out of the training.
- Treat others with respect and refrain from being disruptive, condescending or competitive with others who may have less expertise or knowledge than yourself.
- These sessions are recorded for distribution to folks who are unable to make it on any particular week. So, if you do not want to appear on the video, feel free to turn your camera off.
- You are welcome to forward the meeting invitation to anybody who has a genuine interest in the subject matter.
- Do not be afraid to ask questions, but please utilize the ‘raise hand’ function rather than cutting off the speaker.
- Stay muted unless you are speaking (background noise is distracting).
- If you want to present content, let us know, and we will work with you to get that on the schedule.
- Our work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Simply put, please share it, provide attribution, and if you remix it then share generously with others.
⚙️ Standard Meeting & Discussion Structure:
- Each training session takes place every Wednesday night at 9PM ET.
- Usually, each training session will take place over the course of 60min-75min.
- The format of a training session usually involves about 5 minutes for any new introductions, then a 20min-45min conversational lecture about a particular topic or domain of cybersecurity followed by an open Q&A and finally completed with a closing.
🙌 Ideal People To Join This Training Series:
- Anyone interested in learning more about information security and cybersecurity with an emphasis on practical and real-world insight.
- Anyone pursuing a career change in the information security or cybersecurity field. Beware: “This is a toughy! But you can do it if you are motivated, hardworking, and persistent.”
- Information security and cybersecurity professionals seeking additional insight into other aspects of the field or just continuously learning.
- Other information security and cybersecurity professionals with a plethora of experience who are willing to help chime in and help educate eager learners who are new to information security and cybersecurity.
✋ What This Training Series Isn’t:
- This is not a paid boot camp, nor is it training focused on any specific industry role or certification; this is just some folks talking about cybersecurity and having fun. There are zero warranties attached to the training sessions or content.
- This is not a recruitment pipeline for Gotham Security; Christian and Travis put together this training content as individuals, and there should be no expectation of a job opportunity out of attending any training series.
- This is not a sales pipeline for Gotham Security; we are not looking to talk about sales opportunities or the specifics of any current or past customer projects. If you feel there may be a natural introduction with some other organization, reach out to Christian & Blake separately.
- This is not a formal training series, you do not need to register or RSVP on a weekly basis, you learn what you want and extract the value you see fit.
❓General FAQ:
Do I have to pay for this?
No. This training series is 100% free.
Do I have to already be a cybersecurity expert to participate?
No. Although there are some advanced engineers who regularly attend, most who participate are relatively new to the field. Each training session is designed to be understandable and beneficial without extensive industry experience.
Is this only about Red Team / Penetration Testing?
No. While many topics and real-world stories/examples come from the perspective of a penetration test, the insight provide is applicable to blue or purple team roles as well.
Fun Footer Stuff:
Copyright 2023 Cyber Judo. All of our work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License. Simply put, please share it, provide attribution and if you remix it then share generously with others. The work of others that is featured on this site is always provided with attribution and is not directly monetized.
Disclaimers:
The opinions expressed here are respectively our own and do not reflect the views of our organization or anyone else unless quoted verbatim.
We try our best to provide helpful insight to folks but there is no warranty to completeness of anything we create or post here; so please be sure to always do your own research.