The Cyber Launch Newsletter #7!


1. Free Beginner to Cyber Professional Learning Path!🕵️‍♂️

I created a 100% free learning path that takes you from complete beginner to Security Operations Center (SOC) Analyst!

This guide is an entire curriculum of FREE classes that takes you from complete beginner to SOC Analyst!

This was a ton of work, but I truly believe that if you follow this guide as written, you can become a SOC Analyst without spending a dime!

Even if you don’t want to become a SOC Analyst, you should check out the Cybersecurity Fundamentals section of the guide!

The Cybersecurity Fundamentals section applies to every job in Cybersecurity!

Get it here: ​Everything you need to know to become a SOC Analyst, FOR FREE!​

2. Cybersecurity news you missed: Volt Typhoon Ramps Up Attacks Against Critical Infrastructure

​Volt Typhoon Targets Critical Infrastructure​

Quick summary:

China-backed cyber espionage group Volt Typhoon is strategically targeting legacy Cisco devices in a sophisticated and stealthy campaign to expand its attack infrastructure. The threat actor is known for targeting critical infrastructure. The group has been observed compromising end-of-life Cisco routers, with estimates that Volt Typhoon may be responsible for compromising as much as 30% of observed devices over a 37-day period.

The attacks have targeted critical infrastructure organizations in the US, UK, and Australia, including water utilities, power suppliers, transportation, and communications systems. Volt Typhoon employs living-off-the-land techniques, routing its traffic through compromised routers to avoid detection. The group’s strategic focus is on taking advantage of known vulnerabilities that are likely to go unaddressed due to discontinued support and updates for these devices.

3. Cyber Tool Highlight: ​pfSense​

pfSense is an open-source firewall and routing software based on FreeBSD. It functions as a firewall, router, and VPN gateway, offering features like packet filtering, intrusion prevention, and VPN support. It has a web-based configuration interface and is suitable for various network sizes, from home to enterprise environments.

This tool is completely free and open source!

Want to learn how to get started with pfSense? Check out this FREE training from pfSense!

👉 ​FREE pfSense Training​

Exclusive Newsletter Deal: ​NordVPN​

As a Cybersecurity professional, it is vital to ensure you are protecting your personal networks and devices. That’s why I am partnering with NordVPN this week!

What is a VPN?

VPN stands for “virtual private network” — a service that protects your internet connection and privacy online. VPNs create an encrypted tunnel for your data, protect your online identity by hiding your IP address, and allow you to use public Wi-Fi hotspots safely.

NordVPN also comes with built-in Threat Protection with antivirus features designed to defend your devices against everyday online cyber threats (like malware and trackers).

  • Web protection: Block malicious websites, stop web trackers, and remove annoying ads.
  • File protection: Scan newly downloaded files and remove malware.
  • Vulnerability detection: Detect risky applications.

👉 ​Save up to 63% and protect yourself online now!​

Interview Question of the Week!

Each week I pose a question that I have personally asked or have been asked in real interviews. Try to answer the question by speaking your response out loud! It may feel weird at first but trust me: it will level up your interview game! Practice makes perfect!

This Week’s Interview Question:

“Why is it important to encrypt network traffic?”

Next week I will write out how I would answer this question, so look out for next weeks newsletter!

Last Week’s Interview Question / Answer:

Question: “Explain the concept of a firewall and its role in network security.”

Answer: “A firewall is a security barrier that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Its role in network security is to prevent unauthorized access, protect against cyber threats, and regulate data flow to ensure the integrity and confidentiality of a network.