Theme Technical Testing

This page contains tests of technical aspects of the theme I am using and Jekyll in general.

Michael McDonnell

Michael McDonnell/ The Cybersecurity Librarian

404.html_pages/detection-engineering-notes.mdindex.html_pages/learning-podcasts.md_pages/learning-writing.md_pages/learning.md_pages/moro-and-mike.md_pages/moro-mike-podcast.xml_pages/test.mdassets/css/style.scssassets/minima-social-icons.liquidfeed.xmlblog/page2/index.htmlblog/page3/index.htmlblog/page4/index.htmlblog/page5/index.htmlblog/page6/index.htmlsitemap.xmlrobots.txt _pages/detection-engineering-notes.md_pages/learning.md_pages/moro-and-mike.md

404

Page not found :(

The requested page could not be found.

Last Update: 2023-03-19

I want to better understand the industry landscape and emerging practices in Detection Engineering. These are my notes on DE perspectives, frameworks, processes, tools, and people to learn from.

What is Detection Engineering?

Detection engineering is the process of identifying threats before they can do significant damage. Detection engineering is about creating a culture, as well as a process of developing, evolving, and tuning detections to defend against current threats. – CrowdStrike

Detection engineering transforms information about threats into detections…. Detection engineering transforms an idea of how to detect a specific condition or activity into a concrete description of how to detect it. – Florian Roth

Detection engineering is by no means limited to the detection of events (activity). It also includes detecting conditions (states), often used in digital forensics or incident response. – Florian Roth

A Threat Detection Engineer is someone who applies domain knowledge on designing, building or maintaining detection content in the form of detections generating alerts; or interfaces in the form of dashboards or reports supporting the security monitoring practice within an organization. – Alex Teixeira

Detection engineering is a process—applying systems thinking and engineering to more accurately detect threats. The goal is to create an automated system of threat detection which is customizable, flexible, repeatable, and produces high quality alerts for security teams to act upon. – Laura Kenner, uptycs

Detection engineering functions within security operations and deals with the design, development, testing, and maintenance of threat detection logic. – Mark Stone, panther

Detection engineers design and build security systems that constantly evolve to defend against current threats. – Josh Day, gigamon

Threat hunting and detection engineering are different specializations, but are closely related. They have common goal of finding attackers using available data, whether its the attackers that got past your detections (threat hunting) or the next ones through (detections). – Mark Simos

Perspectives

Can I get certified as a Detection Engineer?

Maybe. I never thought about that before.

How can I learn more about Detection Engineering?

Reading

Articles

Blogs

Books

Listening (Podcasts)

Watching (Videos)

Courses

Events (Conferences)

What are the core Detection Engineering Processes?

TODO. See articles above for now.

What tasks should a Detection Engineering Program document?

Appendix C.3 of the MITRE book 11 Strategies of a World-Class Cybersecurity Operations Center outlines a framework for Detection Engineering/SOC Systems Administrator documentation. In a past job, I worked together with a SOC Syadmin, collaborated on documentation that was similar. I was delighted when I read this appendix and found it was a strong match for what we did. It drove new effeciencies, supported better understanding by incident handlers, and ensured our systems were well maintained and worked.

This key document types for SOC Engineering are:

  • Monitoring Architecture
  • Internal Change Management Processes
  • Systems and Sensors Maintenance and Build Instructions
  • Operational, Functional, and Systems Requirements
  • Budget and current spending (capital and operational expenditures)
  • Unfunded Requirements
  • Sensor and SIEM Detections/Analytics/Content Lists(s)
  • SOC System Inventory
  • Network Diagrams

I like to focus more on the documentation of use-case development. In the MITRE book that would be “Sensor and SIEM Detections/Analytics/Content List(s)” as well as “Internal Change Management Processes” primarily. Below is my own framework for the medium-grained tasks a Detectin Engineer would carry out. You can think of each item below as being an artifact or task documented in Jira or Confluence etc.

  • Document use-case – Taking as input some need, define the use-case so that it maybe reviewed and prioritized and added to the backlog
  • Develop use-case – Input is a documented need for the use-case. Perform in-depth requirements analysis, data wrangling, iterative development of detection and data sources, and full documentation. Output is a test detection in non-production ready to be reviewed for acceptance by stakeholders, and for final implementation.
  • Implement use-case – Input is an developed use-case that has passed acceptance. Implement it in production and remove it from the backlog.
  • Monitor use-cases – Input is all production use-cases. Monitor use-cases and periodically review them for relevancy and effectivness. Output is requests to retire, enhance, or maintain the use-cases
  • Retire use-case – Input is a request from monitoring of all use-cases. Ensure the use-case is disabled tracking anything that has dependencies on the use-case. If necassary create a new use-case to replace this one if others depend on it but it needs to be retired. Output is confirmation that retirement has not caused adverse impact.
  • Plan threat-hunt – Input is demand for a new use-case. Generate a hypothesis and test plan. Describe data sources needed, effort and resources required and a schedule. Output is a plan and schedule ready for approval.
  • Execute threat-hunt – Input is a threat hunt plan that has been approved. Gather the required team, and on schedule execute the hunt. Output is documented findings, and possibly escalation to incident response.
  • Develop metric – Input is a deman from a stakeholder or a documented use-case ready for development. Develop a way to measure the effectiveness of a use-case, or some aspect of the DE program. Output is the logic/process for a scheduled report dashboard or some data.
  • Implement metric – Input is a developed metric. Implement it and remove it from the backlog.
  • Report metrics – Input is all developed, implemented metrics. Operationize reporting. Output is feedback into the use-case development process or advise to stakeholders outside DE.
  • Document datasource
  • Implement datasource
  • Monitor datasource

Frameworks

Naming Conventions

  • From LASCON talk by – Primary Key:SCOPE:TTP:Short name – Scope is servers, workstations, or something more granular –

Detection Specification Languages/Formats

  • Sigma
  • YARA
  • Splunk SPL
  • Microsoft KQL
  • Snort Rules
  • GraphQL
  • YAML

Managing a Backlog of Work

  • JIRA

Processes

  • Agile Use Case Detection Methodologies
  • DevOps CI/CD

Standards

  • Sigma

EDR

  • Wazuh
  • CrowdStrike
  • Microsoft Defender for Endpoint

SIEM

  • Microsoft Sentinel
  • Splunk Enterprise Security

SOAR

  • Splunk SOAR
  • LogicHub
  • Palo Alta Cortex
  • CrowdStrike Fusion

Analytics

Data Sources (Event Logs)

  • MITRE ATT&CK datasource mapping
  • Sysmon
  • Linux auditd
  • Filebeat
  • Windows Events
  • syslog
  • Firewall Logs
  • Zeek (network events)
  • DNS logs
  • Anti-virus Alerts
  • Active Directory changes
  • AWS CloudTrail

Malware Analysis

  • VirusTotal
  • Any.run
  • Hybrid Analysis
  • Cisco Malware Analytics
  • IDA Pro

Who are the leaders in Detection Engineering?

What is the relationship between Detection Engineering and Incident Response?

What is the relationship between Detection Engineering and Threat Hunting?

Threat Hunting and Detection Engineering go hand-in-hand. Threat Hunting methods are used by Detection Engineers to validate their detection logic, data sources, and measure effectiveness. That said, Threat Hunting has additional outcomes unrelated to Detection Engineering goals, and may trigger incident response.

Most Detection Engineering use-cases begin with a Threat Hunt to validate and priorize the use-case. If the threat hunt proves difficult, it helps estimate the effort of developing the use-case for detecting that threat. If the threat hunt yeilds few false positives, it indicates that the use-case could be highly effective and should get higher priority. If the threat hunt fails due to lack of data, it may indicate that developmen to the use-case should be deferred until the datasource can be developed.

What is the relationship between Detection Engineering and Threat Intelligence?

The need for new detections is often driven by threat intelligence. We want to detect threats before they become incidents and the earliest needs may come from threat intelligence analysis. For example, if Qakbot has changed their methods but your organization has not yet encountered them, threat intelligence may be able to provide information on how to detect the new methods days before you are attacked.

A good detection engineer reads threat reports differently than a malware or TI analyst. He/she discovers detection opportunities, pivots and writes rules for any trace the reported threat may have left. – Florian Roth

What is the relationship between Detection Engineering and Offensive Security?

What is the relationship between Detection Engineering and IT Asset Inventory?

Detection Engineering both consumes and produces asset inventories. Detection Engineering crucially requires quality inventory of assets, identifies, and configurations.

If you want to measure the converage of your detections for an specific threat, you will need to have an inventory of assets targeted by, exposed to, or vulnerable to the threat. If you don’t have a good inventory, you will not know how effective your detection will be. For example, if you have a detection for exploitation of a vulnerability in MS SQL Server, but you don’t know how many SQL Servers you have, or their addresses, you cannot determine if your detection will actually work.

Detection Engineers often have specific inventory requirements that others do not. For example, knowing which security agents are present, knowing how assets are configured, knowing what permissions an identity has. These all can be used to enrich detections to priotize alerts by priority of the asset or severity of the detected threat. Without this additional information, you can detect a threat, but not detemine how urgent a response to that threat is.

What is the relationship between Detection Engineering and Malware Analysis?

This is a list of high-quality audio-only podcasts

Top 3

The Cybersecurity Librarian recommends these 3 podcasts. They have these attributes:

  • Original Content
  • Quality Analysis
  • Minimal or Stated Bias
The Cyberwire
I believe this is the gold standard for general daily cybersecurity news. The content is timely. The producers actively minimize, disclose, or state bias. The information is accurate and authoritative. The sources they choose are well selected and authoritative. I have seen them state when a source was not primary. The analysis is insightful. The style of the primary host (Dave Bittner) is charming, wry, and still effecient and professional. The guests are well choosen and diverse. While the revenue model they have (advertising/sponsorship) does bias their selection of guests, the interviews themselves appear to be far less bias than other similar shows.
The Cyberwire has a number of spin-off podcasts on the topics of Social Engineer, Cybersecurity Law, Security and Vulnerability Research, and Security Management. Each strikes its own balance of entertainment, education, and original content. Each relies on unique and authoritative guests.
Malicious Life
An extraordinary documentary-style podcast. The host Ran Levi is an engaging presenter and selects worthy topics from the history of cybercrime. What makes this podcast worth listening too is how the producers take complicate timelines of events, balance the detail required, and tell the story of major historical cybersecurity events. There is occaisional bias, but the hosts are good at stating it (mostly). The accuracy and historical detail of the content are impressive. They manage to balance the level of historical and technical detail and tell an entertaining and educational story.
Darknet Diaries
Darknet Diaries presents stories of recent cybercrimes and interviews with cybercriminals, hackers, and penetration testers. Despite the title, the stories are not about the Darknet per se, but about criminal hacking and world of those that compromise security. The topics are diverse, the storytelling is compelling, and interviewed guests are unique. This will give you more than just an entertaining look at cybercrime, it allows us a window into the minds of the people behind many well known security incidents. This is not fact-checked journalism: these are excellent stories. You will hear first hand accounts from criminals and here them state their motivations, tell their life stories, and explain their actions.

News / Threat Intelligence

Discarded
Proofpoint has an amazing Cyber Threat Intelligence team. They are especially well known for tracking email-based threats. This podcasts gives you a behind-the-scenes look into the work of Proofpoint’s intelligence analysts. Typical episodes introduce you to a few analysts, their backgrounds, and the focus of their intelligence work. Then there is a discussion that follows about notable threat actors or analysis methods. If your work involves reporting on any of the “TA” actors (TA505, TA577, TA570), then this podcast is for you. While this is sponsored by a security vendor it is not marketing oriented, and seems to be driven by the analysts themselves giving it an authentic feel: quality content instead of shiny production values.
Click Here
Recorded Future’s newest podcast takes a journalistic style that is different than many other security podcasts. The topics are typically similar to what you might see in the news, but coving the “cyber” side: cyber-espionage, cyber-crime, or cyber-intelligence. The host, Dina Temple-Raston, was formerly part of NPR’s Investigation team and the podcast takes on a serious and more intriguing tone: The format is documentary journalism not round-table discussion.
Recorded Future Podcast
Recorded Future is a company that offers Threat Intelligence services. Their podcast is hosted by Cyberwire host Dave Bittner, and presents interviews with professionals involved in Cyber Threat Intelligence work. Unlike many other vendor podcasts, this one does not focus exclusively on interviewing their own staff and includes many people throughout the industry. It is not a sales-focused marketing initiative and the treatment of topics and selection of guests does not appear to be overly biased.

Privacy, Law, and Policy

Caveat
Caveat is hosted by Cyberwire’s Dave Bittner and Lawyer Ben Yelin. You do not have to be a lawyer to enjoy or learn from this podcast. It discusses recent cybersecurity news and events that are impacted by law.
Privacy Insider
Hosted by Justin Antonipllai, the former Under Secretary for Economic Affairs at the US Department of Commerce, this podcast takes a serious look at law, policy, and social issues related to privacy. The Cybersecurity Librarian has yet to render a verdict on bias. It is sponsored, but the content seemed more “privacy geek” than marketing.

Management and Leadership

Dev.Sec.Lead
While this podcast is no longer produced, it is still available on most platforms. Hosted by Threat Intelligence author Wilson Bautisa Jr., this podcast focuses on leadership development. It is of interest not just to CISOs and managers, but also for the every-day professional. The interview and topics vary greatly and the depth the topics are treated is refreshing. These guests are positive role models focused on improving our profession. This

Writing is a vital skill in cybersecurity. Even those in highly technical roles will be required to write clear concise technical documentation, procedures, and playbooks. Those involved in the assessment of risk, threats, and vulnerabilities will benefit from strong report writing skills. Managers and Consultants have the greatest need to develop effective communication and persuasive writing abilities.

The resources listed on this page will help you develop your writing skills, no matter what your role and need. Please share with us anything that you found helpful. The most useful, clear, and authoritative resources will be added to this list.

Top 3

Ten Steps to Help you Write Better Essays & Term Papers
This book by Neil Sawer is concise and practical. It doesn’t make you learn theory, it tells you what actions to take, right now, to start writing. Then it tells you want you can do to edit your writing and improve it. While this book is focused on students, the advice applies generally to anyone suffering from writers block, or who finds themselves challenged to write more clearly or briefly.
How to write Proposals, Sales Letters & Reports
Also from Neil Sawer, this book uses some of the same writing advice from “Write Better Essays” and applies it to the business world. There is more emphasis on persuasive writing and on communicating with visuals, charts, etc.

Writing for Penetration Testers and Vulnerability Assessment

If you have additional or better examples, templates, or writing guides for pentration testers, please let us know!

Penetration Testers rarely start as excellent writers. Your observations and discoveries need to be communicated and understood if they are to be valued. If you have felt frustrated trying to find good resources on writing pentest reports, you are not alone. Standards for writing pentest reports are emerging and so is advince on good writing. If writing is new to you, remember it just takes practice, just like pentesting does.

Start with learning how to write a narrative report: the most common and easiest type of pentest report.

Penetration Test Report
Offensive Security has provided this template for use by their OSCP penetration testing students for years. It is intended to capture what activities you carried our in your pentest and the order you did them. While it does include recommendations the main focus is on capturing evidence.

Your clients will probably want more than a narrative report. Most want documented observations, risk assessment, and actionable recommendations. When you get good at writing your narrative reports, and consistently include verifiable proof of testing as well as verifiable findings, it will be time to practice writing more complete reports.

Writing Penetration Testing Reports
This is a paper from the SANS Institute’s Reading Room, submitted by a GIAC candidates paper for “GOLD” certification. It presents a fuller view of what a penetration testing report should look like. You will notice that it does not bear much resemblance to the Offensive Security “narrative” template. A narrative report would be an appendix to this type of report. This is what a client is looking for from a vulnerability report: background, risk assessment, and actionable recommendations.

Project Propoals and Statements of Work

If you work as a consultant you will need to write Statements of Work (SOWs) frequently. These are brief summaries that contain a Work Breakdown Structure (WBS) and estimated effort. They do not fully describe a Scope of Work, but are enough to authorize work when a client has trust and clear understanding.

Consultants and employees with initiative will have to write Project Proposals or Plans. These are larger detailed documents that explain the background and need for a project, the detailed scope, a Work Breakdown Structure, estimated effort, requirements for the project, roles of the parties involved, estimates of cost, and more.

How to write Proposals, Sales Letters & Reports
This book uses some of the same writing advice from “Write Better Essays” and applies it to the business world. There is more emphasis on persuasive writing and on communicating with visuals, charts, etc.

The Cybersecurity Librarian maintains a list of use references for helping you to learn more about cybersecurity, to keep up to date, and to develop your skills and knowledge. There are seperate pages for major categories of reference material.

Resource Categories

Do you have a great book, video, blog, article, magazine, journal, podcast, or course that helped you? Let us know. The most compelling, useful, concise, and clear resources will be added to the lists!

“Moro and Mike” was a weekly livestream discussing the cybersecurity profession practice. Our topics included leadership, management, job hunting, career development, emotional intelligence, threat intelligence, situational awareness and more. We go beyond the technology to discuss the professional practice of cybersecurity and IT.

Podcasts

The RSS feed for the Moro and Mike Podcast is https://cyberlibrarian.ca//moro-and-mike/podcast.rss

The Podcast is the audio-only portion of the Moro and Mike YouTube Livestream

Moro and Mike is recorded live on YouTube, but past episodes are available in podcast (audio-only) format on:

Just search for “Moro and Mike”.

Past Livestreams

<?xml version=”1.0” encoding=”UTF-8”?>

https://cyberlibrarian.ca/moro-and-mike/about</link> Moro and Mike Professional Development in Cybersecurity and IT en-us michael@cyberlibrarian.ca (michael@cyberlibrarian.ca) michael@cyberlibrarian.ca (michael@cyberlibrarian.ca) 2023 The Cybersecurity Librarian Sun, 26 Mar 2023 23:35:40 +0000 Sun, 26 Mar 2023 23:35:40 +0000 https://cyberlibrarian.ca/moro-and-mike/about</link> https://cyberlibrarian.ca/assets/images/moro-and-mike-thumb-podcast.png Moro and Mike Professional Development in Cybersecurity and IT The Cybersecurity Librarian Moro and Mike cybersecurity,professional development Michael McDonnell michael@cyberlibrarian.ca no Next Level Mentorship Part 2 https://cyberlibrarian.ca/moro%20and%20mike/2020/10/15/Next-Level-Mentorship-Part-2.html</link> Thu, 15 Oct 2020 19:00:00 +0000 Moro and Mike are joined by guest Kristin McVeigh to discuss how to take mentorship to the next level in your career. https://cyberlibrarian.ca/moro%20and%20mike/2020/10/15/Next-Level-Mentorship-Part-2.html Michael McDonnell Next Level Mentorship Part 2 Moro and Mike are joined by guest Kristin McVeigh to discuss how to take mentorship to the next level in your career. 01:05:49 featured,leadership,mentoring,mentorship,career development,careers no no Threat Intelligence Oct 2020 https://cyberlibrarian.ca/moro%20and%20mike/2020/10/01/threat-intelligence-oct-2020.html</link> Thu, 01 Oct 2020 19:00:00 +0000 Alec and Chris join Moro and Mike for a briefing on the latest threats and cybersecurity news for October 2020 https://cyberlibrarian.ca/moro%20and%20mike/2020/10/01/threat-intelligence-oct-2020.html Michael McDonnell Threat Intelligence Oct 2020 Alec and Chris join Moro and Mike for a briefing on the latest threats and cybersecurity news for October 2020 01:03:54 youtube,livestream,cybersecurity,threat intelligence no no Next Level Mentorship https://cyberlibrarian.ca/moro%20and%20mike/2020/08/20/Next-Level-Mentorship.html</link> Thu, 20 Aug 2020 19:00:00 +0000 Moro and Mike are joined by guest Patti Blackstaffe to discuss how to take mentorship to the next level in your career. https://cyberlibrarian.ca/moro%20and%20mike/2020/08/20/Next-Level-Mentorship.html Michael McDonnell Next Level Mentorship Moro and Mike are joined by guest Patti Blackstaffe to discuss how to take mentorship to the next level in your career. 01:27:2 featured,leadership,mentoring,mentorship,career development,careers no no Futurism https://cyberlibrarian.ca/moro%20and%20mike/2020/08/13/Futurism.html</link> Thu, 13 Aug 2020 19:00:00 +0000 Moro and Mike are joined by co-host Warren Lafountain to discuss Futurism and topics like Artificial Intelligence, CRISPR, Self-driving Cars, and more. https://cyberlibrarian.ca/moro%20and%20mike/2020/08/13/Futurism.html Michael McDonnell Futurism Moro and Mike are joined by co-host Warren Lafountain to discuss Futurism and topics like Artificial Intelligence, CRISPR, Self-driving Cars, and more. 01:48:13 featured,futurism,artificial intelligence,crispr,decision intelligence,self-driving cars,machine learning,blockchain no no Handling Rejection https://cyberlibrarian.ca/moro%20and%20mike/2020/08/06/handling-rejection.html</link> Thu, 06 Aug 2020 19:00:00 +0000 Moro and Mike interview HR Professional Emilie Vincent about how job seekers and hiring managers can handle rejection better, provide meaningful feedback, and improve the hiring process. https://cyberlibrarian.ca/moro%20and%20mike/2020/08/06/handling-rejection.html Michael McDonnell Handling Rejection Moro and Mike interview HR Professional Emilie Vincent about how job seekers and hiring managers can handle rejection better, provide meaningful feedback, and improve the hiring process. 01:27:16 featured,youtube,livestream,cybersecurity,leadership,careers,job hunting,management,emotional intelligence,rejection,hiring,management,recruiting no no Threat Intelligence July 2020 https://cyberlibrarian.ca/moro%20and%20mike/2020/07/30/threat-intelligence-july-2020.html</link> Thu, 30 Jul 2020 19:00:00 +0000 Alec and Chris join Moro and Mike for a briefing on the latest threats and cybersecurity news for July 2020 https://cyberlibrarian.ca/moro%20and%20mike/2020/07/30/threat-intelligence-july-2020.html Michael McDonnell Threat Intelligence July 2020 Alec and Chris join Moro and Mike for a briefing on the latest threats and cybersecurity news for July 2020 01:33:26 youtube,livestream,cybersecurity,threat intelligence no no Students and New Professionals https://cyberlibrarian.ca/moro%20and%20mike/2020/07/23/students-and-new-professionals.html</link> Thu, 23 Jul 2020 19:00:00 +0000 Student Leaders Emily and Alex host the show and interview Moro, Mike, and a panel of experts about careers in Cybersecurity https://cyberlibrarian.ca/moro%20and%20mike/2020/07/23/students-and-new-professionals.html Michael McDonnell Students and New Professionals Student Leaders Emily and Alex host the show and interview Moro, Mike, and a panel of experts about careers in Cybersecurity 02:03:14 featured,youtube,livestream,cybersecurity,career-development,students no no Cybersecurity Certifications https://cyberlibrarian.ca/moro%20and%20mike/2020/07/16/cybersecurity-certification.html</link> Thu, 16 Jul 2020 19:00:00 +0000 Moro and Mike are joined by Mark Shykula to discuss the types, value, and controveries of cybersecurity certifications. https://cyberlibrarian.ca/moro%20and%20mike/2020/07/16/cybersecurity-certification.html Michael McDonnell Cybersecurity Certifications Moro and Mike are joined by Mark Shykula to discuss the types, value, and controveries of cybersecurity certifications. 01:39:36 youtube,livestream,cybersecurity,certifications,training,career-development no no Threat Intelligence June 18 2020 https://cyberlibrarian.ca/moro%20and%20mike/2020/06/18/threat-intelligence-june-2020.html</link> Thu, 18 Jun 2020 19:00:00 +0000 Moro and Mike are joined by Chris McNeil and Alec Mather-Shapiro to discuss the value of Threat Intel reports and to discuss recent breaches and cybersecurity news. https://cyberlibrarian.ca/moro%20and%20mike/2020/06/18/threat-intelligence-june-2020.html Michael McDonnell Threat Intelligence June 18 2020 Moro and Mike are joined by Chris McNeil and Alec Mather-Shapiro to discuss the value of Threat Intel reports and to discuss recent breaches and cybersecurity news. 01:29:43 threat-intel no no Leadership and Emotional Awareness https://cyberlibrarian.ca/moro%20and%20mike/2020/06/11/emotional-awareness.html</link> Thu, 11 Jun 2020 19:00:00 +0000 Moro and Mike interview Nahid Asani about his experience as a manager in using emotional intelligence and emotional awareness. https://cyberlibrarian.ca/moro%20and%20mike/2020/06/11/emotional-awareness.html Michael McDonnell Leadership and Emotional Awareness Moro and Mike interview Nahid Asani about his experience as a manager in using emotional intelligence and emotional awareness. 01:17:36 featured,leadership,emotional-awareness,eq,emotional-intelligence no no Networking for Professional Development https://cyberlibrarian.ca/moro%20and%20mike/2020/06/05/networking-irl.html</link> Fri, 05 Jun 2020 19:00:00 +0000 Moro and Mike interview TJ Zhang and Burhan Syed, two people who have excellent In-Real-Life networking skills. Learn how to improve your professional development by meeting people. https://cyberlibrarian.ca/moro%20and%20mike/2020/06/05/networking-irl.html Michael McDonnell Networking for Professional Development Moro and Mike interview TJ Zhang and Burhan Syed, two people who have excellent In-Real-Life networking skills. Learn how to improve your professional development by meeting people. 01:28:04 networking,professional-development,career-development,job-hunting no no Preparing for a Job Interview https://cyberlibrarian.ca/moro%20and%20mike/2020/05/29/preparing-a-job-interview.html</link> Fri, 29 May 2020 19:00:00 +0000 Moro and Mike talk to Jessica Riad-Wallace about how people can prepare for job interviews. https://cyberlibrarian.ca/moro%20and%20mike/2020/05/29/preparing-a-job-interview.html Michael McDonnell Preparing for a Job Interview Moro and Mike talk to Jessica Riad-Wallace about how people can prepare for job interviews. 01:40:00 featured,careers,job-interview,professional-development no no Cybersecurity in Popular Culture https://cyberlibrarian.ca/moro%20and%20mike/2020/05/22/cybsecurity-in-popular-culture.html</link> Fri, 22 May 2020 19:00:00 +0000 Moro and Mike are joined friends to discuss representations of cybersecurity in popular culture including music, books, news, and movies. https://cyberlibrarian.ca/moro%20and%20mike/2020/05/22/cybsecurity-in-popular-culture.html Michael McDonnell Cybersecurity in Popular Culture Moro and Mike are joined friends to discuss representations of cybersecurity in popular culture including music, books, news, and movies. 02:11:03 featured,cybersecurity,music,movies,books,popular-culture no no Job Hunting and Online Presence https://cyberlibrarian.ca/moro%20and%20mike/2020/05/15/networking-and-job-hunting.html</link> Fri, 15 May 2020 19:00:00 +0000 Moro and Mike interview TJ Zhang and Jessica Riad-Wallace, two exception role models for authentic and effective online networking and social media presence. https://cyberlibrarian.ca/moro%20and%20mike/2020/05/15/networking-and-job-hunting.html Michael McDonnell Job Hunting and Online Presence Moro and Mike interview TJ Zhang and Jessica Riad-Wallace, two exception role models for authentic and effective online networking and social media presence. 01:32:02 job-hunting,networking,careers,linkedin no no Advice on Resumes and Cover Letters https://cyberlibrarian.ca/moro%20and%20mike/2020/05/08/advice-on-resumes-and-cover-letters.html</link> Fri, 08 May 2020 19:00:00 +0000 Moro and Mike and guest Jim Clark provide advice on Resumes and Cover Letters https://cyberlibrarian.ca/moro%20and%20mike/2020/05/08/advice-on-resumes-and-cover-letters.html Michael McDonnell Advice on Resumes and Cover Letters Moro and Mike and guest Jim Clark provide advice on Resumes and Cover Letters 01:59:38 careers,podcast,livestream,professional development,job hunting,networking no no Career Stories and Advice https://cyberlibrarian.ca/moro%20and%20mike/2020/05/01/career-stories.html</link> Fri, 01 May 2020 19:00:00 +0000 Moro and Mike interview a series of Cybersecurity and IT professionals about their career stories and advice for career development. https://cyberlibrarian.ca/moro%20and%20mike/2020/05/01/career-stories.html Michael McDonnell Career Stories and Advice Moro and Mike interview a series of Cybersecurity and IT professionals about their career stories and advice for career development. 01:53:18 careers,podcast,livestream,career stories,professional development no no

Theme Technical Testing

This page contains tests of technical aspects of the theme I am using and Jekyll in general.

{{ site.author.name }}

{{ site.author.name escape }}
{%- assign default_paths = site.pages map: “path” -%}    
{%- assign page_paths = site.header_pages default: default_paths -%}    
{%- assign titles_size = site.pages map: ‘title’ join: ‘’ size -%}
{{ “/” relative_url }}
{{ site.title escape }}

{{ default_paths }} {{ page_paths }} {{ site.pages }} {{ site.pages | map: ‘title’ | join: ‘’ }} {{ titles_size }} @import “minima/skins/{{ site.minima.skin | default: ‘classic’ }}”, “minima/initialize”;

{% comment %} Iterate through {{ site.minima.social_links }} and render platform related SVG-symbol unless the platform is "rss" because we need the "rss" symbol for the `Subscribe` link in the footer and therefore inject the "rss" icon outside the iteration loop. {% endcomment %} {% for entry in site.minima.social_links %} {%- assign symbol_id = entry.platform -%} {%- unless symbol_id == "rss" -%} {%- include svg_symbol.html key = symbol_id -%} {% endunless %} {%- endfor -%} {%- include svg_symbol.html key = "rss" -%}

<?xml version=”1.0” encoding=”utf-8”?>{% if page.xsl %}<?xml-stylesheet type=”text/xml” href=”{{ ‘/feed.xslt.xml’ | absolute_url }}”?>{% endif %}<feed xmlns=”http://www.w3.org/2005/Atom” {% if site.lang %}xml:lang=”{{ site.lang }}”{% endif %}>Jekyll<link href=”{{ ‘/’ | absolute_url }}” rel=”alternate” type=”text/html” {% if site.lang %}hreflang=”{{ site.lang }}” {% endif %}/>{{ site.time | date_to_xmlschema }}{{ page.url | absolute_url | xml_escape }}{% assign title = site.title | default: site.name %}{% if page.collection != “posts” %}{% assign collection = page.collection | capitalize %}{% assign title = title | append: “ | “ | append: collection %}{% endif %}{% if page.category %}{% assign category = page.category | capitalize %}{% assign title = title | append: “ | “ | append: category %}{% endif %}{% if title %}{{ title | smartify | xml_escape }}{% endif %}{% if site.description %}{{ site.description | xml_escape }}{% endif %}{% if site.author %}{{ site.author.name | default: site.author | xml_escape }}{% if site.author.email %}{{ site.author.email | xml_escape }}{% endif %}{% if site.author.uri %}{{ site.author.uri | xml_escape }}{% endif %}{% endif %}{% if page.tags %}{% assign posts = site.tags[page.tags] %}{% else %}{% assign posts = site[page.collection] %}{% endif %}{% if page.category %}{% assign posts = posts | where: “category”, page.category %}{% endif %}{% unless site.show_drafts %}{% assign posts = posts | where_exp: “post”, “post.draft != true” %}{% endunless %}{% assign posts = posts | sort: “date” | reverse %}{% assign posts_limit = site.feed.posts_limit | default: 10 %}{% for post in posts limit: posts_limit %}<entry{% if post.lang %}{{“ “}}xml:lang=”{{ post.lang }}”{% endif %}>{% assign post_title = post.title | smartify | strip_html | normalize_whitespace | xml_escape %}{{ post_title }}{{ post.date | date_to_xmlschema }}{{ post.last_modified_at | default: post.date | date_to_xmlschema }}{{ post.id | absolute_url | xml_escape }}{% assign excerpt_only = post.feed.excerpt_only | default: site.feed.excerpt_only %}{% unless excerpt_only %}{{ post.content | strip | xml_escape }}{% endunless %}{% assign post_author = post.author | default: post.authors[0] | default: site.author %}{% assign post_author = site.data.authors[post_author] | default: post_author %}{% assign post_author_email = post_author.email | default: nil %}{% assign post_author_uri = post_author.uri | default: nil %}{% assign post_author_name = post_author.name | default: post_author %}{{ post_author_name | default: "" | xml_escape }}{% if post_author_email %}{{ post_author_email | xml_escape }}{% endif %}{% if post_author_uri %}{{ post_author_uri | xml_escape }}{% endif %}{% if post.category %}{% elsif post.categories %}{% for category in post.categories %}{% endfor %}{% endif %}{% for tag in post.tags %}{% endfor %}{% if post.excerpt and post.excerpt != empty %}<summary type="html">{{ post.excerpt | strip_html | normalize_whitespace | xml_escape }}</summary>{% endif %}{% assign post_image = post.image.path | default: post.image %}{% if post_image %}{% unless post_image contains “://” %}{% assign post_image = post_image | absolute_url %}{% endunless %}{% endif %}</entry>{% endfor %}</feed><?xml version=”1.0” encoding=”UTF-8”?> {% if page.xsl %}<?xml-stylesheet type=”text/xsl” href=”{{ “/sitemap.xsl” | absolute_url }}”?> {% endif %} {% assign collections = site.collections | where_exp:'collection','collection.output != false' %}{% for collection in collections %}{% assign docs = collection.docs | where_exp:'doc','doc.sitemap != false' %}{% for doc in docs %}

{{ doc.url | replace:'/index.html','/' | absolute_url | xml_escape }}

{% if doc.last_modified_at or doc.date %}{{ doc.last_modified_at | default: doc.date | date_to_xmlschema }} {% endif %}</url> {% endfor %}{% endfor %}{% assign pages = site.html_pages | where_exp:’doc’,’doc.sitemap != false’ | where_exp:’doc’,’doc.url != “/404.html”’ %}{% for page in pages %}

{{ page.url | replace:'/index.html','/' | absolute_url | xml_escape }}

{% if page.last_modified_at %}{{ page.last_modified_at | date_to_xmlschema }} {% endif %}</url> {% endfor %}{% assign static_files = page.static_files | where_exp:’page’,’page.sitemap != false’ | where_exp:’page’,’page.name != “404.html”’ %}{% for file in static_files %}

{{ file.path | replace:'/index.html','/' | absolute_url | xml_escape }} {{ file.modified_time | date_to_xmlschema }}

</url> {% endfor %}</urlset> Sitemap: {{ “sitemap.xml” | absolute_url }}

Detection Engineering NotesRecommended PodcastsWriting SkillsLearning ResourcesMoro and MikeMoro and Mike PodcastTechnical Tests 128