Justin Johnson
Justin Johnson

Justin Johnson

ThreatHunting

61 stories

The Cyber Kill Chain
Justin Johnson

Justin Johnson

Detection Engineering

333 stories

Justin Johnson

Justin Johnson

Forensics

24 stories

Justin Johnson

Justin Johnson

MalwareAnalysis

20 stories

Justin Johnson

Justin Johnson

Red Team

80 stories

Justin Johnson

Justin Johnson

Cyberlab

30 stories

Justin Johnson

Justin Johnson

Mindmaps

1 story

Justin Johnson

Justin Johnson

AI/LLMs

2 stories

Justin Johnson

Justin Johnson

HomeSecurity

3 stories

SSH Key-based Authentication diagram
Justin Johnson

Justin Johnson

Linux Admin

15 stories

Justin Johnson

Justin Johnson

ThreatIntel

60 stories

Traffic Light Protocol (TLP)
What is threat modeling
Justin Johnson

Justin Johnson

Osint

8 stories

Black and white pencil sketch of a Python snake wrapped around a computer displaying code, with subtle dark web elements and the Tor logo.
Justin Johnson

Justin Johnson

Incident Response

43 stories

Justin Johnson

Justin Johnson

Blue Team

55 stories

SSH Key-based Authentication diagram
Justin Johnson

Justin Johnson

SOC

11 stories

Justin Johnson

Justin Johnson

MetricsnKPIs

4 stories

Justin Johnson

Justin Johnson

Adversary Emulation

30 stories

Justin Johnson

Justin Johnson

Tenable

No stories

Justin Johnson

Justin Johnson

AI Hacking

No stories

Justin Johnson

Justin Johnson

Scripting

13 stories