Wyatt Tauber
Image for post
Image for post

I creating a tool to identify and generate common typos for popular Bitly links to prevent them from being used by scammers.


Image for post
Image for post
The CASP+ is CompTIA’s advanced-level certification for technical cybersecurity professionals.

Exam Information

  • 19% Risk Management — business and industry influences, policies and procedures, risk mitigation strategies, risk metrics
  • 25% Enterprise Security Architecture — network security components, host security components, mobile and small form factor device security, software vulnerabilities and controls
  • 20% Enterprise Security Operations — security assessments, incident response, forensics, and tools to conduct each…


Image for post
Image for post

Dear customer. Your Account Has Been Blocked. Please check your account information by clicking the link below.


Image for post
Image for post
The GIAC Incident Handler certification validates a practitioner’s ability to detect, respond, and resolve computer security incidents using a wide range of essential security skills.

Exam Information


The Department of Energy CyberForce logo
The Department of Energy CyberForce logo
CyberForce is a workforce development competition that focuses on the defensive/hardening nature of energy cyberinfrastructure.

MetaCTF logo in front of a computer screen
MetaCTF logo in front of a computer screen
MetaCTF held its annual CyberGames competition on the weekend of October 24th.

Logos for conINT, The Many Hats Club, Trace Labs, and NCPTF
Logos for conINT, The Many Hats Club, Trace Labs, and NCPTF
The inaugural conINT Intelligence Conference was held on October 17th and 18th, 2020.

Trace Labs


Image for post
Image for post
The Cisco Certified CyberOps Associate focuses on operational skills and knowledge needed in security operations centers.

Exam Information


Image for post
Image for post
The CompTIA PenTest+ is a basic penetration testing certification emphasizing planning, scoping, and reporting on offensive engagements.

Exam Information

  • 15% Planning and Scoping — policies and procedures, legal concepts, contract types, and rules of engagement
  • 22% Information Gathering and Vulnerability Identification — vulnerability scanning and enumeration, exploit identification, identifying and scanning specialized…


Image for post
Image for post
The RIT Computing Security Lab

About

Wyatt Tauber

DFIR, CTFs, disinformation, STEM education, and pretty much anything else that comes to mind. RIT Computing Security ’22. wyatttauber.com

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store