|
15 | 15 | subtitle: [Introduction to the Offensive Security Mindset], |
16 | 16 | ) |
17 | 17 |
|
| 18 | +#slide(title: "Outline")[ |
| 19 | + #metropolis-outline |
| 20 | +] |
| 21 | + |
| 22 | +#new-section-slide("Introduction") |
| 23 | + |
18 | 24 | #slide(title: "What is the Offensive Security Mindset")[ |
19 | | -- The offensive security mindset is characterized by a proactive approach to cybersecurity. |
| 25 | + - The offensive security mindset is characterized by a proactive approach to cybersecurity. |
20 | 26 |
|
21 | 27 |
|
22 | | -- It involves actively seeking vulnerabilities and weaknesses in systems to improve their security. |
| 28 | + - It involves actively seeking vulnerabilities and weaknesses in systems to improve their security. |
23 | 29 |
|
24 | 30 |
|
25 | | -- This mindset is crucial for penetration testing and other offensive security practices. |
| 31 | + - This mindset is crucial for penetration testing and other offensive security practices. |
26 | 32 |
|
27 | 33 | ] |
28 | 34 |
|
| 35 | +#new-section-slide("Red vs. Blue") |
| 36 | + |
29 | 37 | #set page(background: image("figures/red_vs_blue_team.jpg", width: 100%, height: 100%)) |
30 | 38 | #slide(title: "")[ |
31 | 39 | ] |
32 | 40 | #set page(background: none) |
33 | 41 |
|
34 | | -#slide(title:"")[ |
35 | | - #side-by-side[ |
36 | | - #image("figures/asimov.png") |
| 42 | +#slide(title: "Red Team")[ |
| 43 | + - Offensive security experts |
| 44 | + - Simulate real-world attacks |
| 45 | + - Identify and exploit vulnerabilities |
| 46 | + - Goal: Test defenses and uncover weaknesses |
| 47 | +] |
| 48 | + |
| 49 | +#slide(title: "Blue Team")[ |
| 50 | + - Defensive security experts |
| 51 | + - Protect systems from attacks |
| 52 | + - Monitor, detect, and respond to threats |
| 53 | + - Goal: Strengthen defenses and mitigate risks |
| 54 | +] |
| 55 | + |
| 56 | +#slide(title: "Purple Team")[ |
| 57 | + - Collaboration between Red and Blue Teams |
| 58 | + - Share knowledge and techniques |
| 59 | + - Ensures that attack insights (Red) improve defenses (Blue) |
| 60 | + - Goal: Continuous improvement of security through teamwork |
| 61 | +] |
| 62 | + |
| 63 | + |
| 64 | +#new-section-slide("Three Key Traits") |
| 65 | + |
| 66 | +#slide(title: "")[ |
| 67 | + #side-by-side(gutter: 3mm, columns: (1fr, 2fr))[ |
| 68 | + #place( |
| 69 | + dx: -40pt, |
| 70 | + dy: -80pt, |
| 71 | + image("figures/asimov.png", width: 130%), |
| 72 | + ) |
37 | 73 | ][ |
38 | 74 | #text[ |
39 | | - "The most exciting phrase to hear in science, the one that heralds new discoveries, is not 'Eureka!' but 'That's funny...'" - Isaac Asimov |
| 75 | + "The most exciting phrase to hear in science, the one that heralds new discoveries, is not 'Eureka!' but 'That's funny...'" |
| 76 | + |
| 77 | + \- Isaac Asimov |
40 | 78 | ] |
41 | 79 | ] |
42 | 80 | ] |
43 | 81 |
|
44 | | -#slide(title: "Three Key Traits")[ |
45 | | -- Curiosity | Stay updated on evolving threats, understand complex systems, discover hidden vulnerabilities, drive innovation, and build collaborative communities. |
| 82 | +#slide(title: "")[ |
| 83 | + #defbox( |
| 84 | + title: [Curiosity], |
| 85 | + [ |
| 86 | + Stay updated on evolving threats, understand complex systems, discover hidden vulnerabilities, drive innovation, and build collaborative communities. |
| 87 | + ], |
| 88 | + ) |
| 89 | + |
| 90 | +] |
| 91 | + |
| 92 | +#slide(title: "")[ |
| 93 | + #defbox( |
| 94 | + title: [Creativity], |
| 95 | + [ |
| 96 | + Think like attackers, discover new attack vectors, develop custom exploits, adapt to evolving threats, and overcome obstacles. |
| 97 | + ], |
| 98 | + ) |
| 99 | +] |
| 100 | + |
| 101 | +#slide(title: "")[ |
| 102 | + #defbox( |
| 103 | + title: [Consistency], |
| 104 | + [ |
| 105 | + Handle complex challenges, learn from failure, adapt to changing environments, maintain motivation, and achieve long-term success. |
| 106 | + ], |
| 107 | + ) |
| 108 | +] |
46 | 109 |
|
| 110 | +#new-section-slide("Mental Health") |
47 | 111 |
|
48 | | -- Creativity | Think like attackers, discover new attack vectors, develop custom exploits, adapt to evolving threats, and overcome obstacles. |
| 112 | +#slide(title: "Burnout")[ |
| 113 | + #image("./figures/burnout_01.png", width: 100%) |
| 114 | +] |
49 | 115 |
|
| 116 | +#slide(title: "Burnout")[ |
| 117 | + #image("./figures/burnout_02.png", width: 100%) |
| 118 | +] |
50 | 119 |
|
51 | | -- Consistency | Handle complex challenges, learn from failure, adapt to changing environments, maintain motivation, and achieve long-term success. |
| 120 | +#slide(title: "Burnout")[ |
| 121 | + #image("./figures/burnout_03.png", width: 100%) |
| 122 | +] |
| 123 | + |
| 124 | +#slide(title: "Burnout")[ |
| 125 | + #image("./figures/burnout_04.png", width: 100%) |
| 126 | +] |
52 | 127 |
|
| 128 | +#slide(title: "Prevent Burnout")[ |
| 129 | +- Work-Life Balance: Set boundaries and recharge. |
| 130 | +- Collaborate: Don’t hack alone — support and be supported. |
| 131 | +- Keep Learning: Curiosity keeps burnout at bay. |
| 132 | +- Manage Stress: Use healthy coping strategies. |
| 133 | +- Celebrate Wins: Big or small, every success counts. |
| 134 | +- Seek Feedback: Growth comes from reflection. |
| 135 | +- Learn from Failure: Every setback teaches you something new. |
53 | 136 | ] |
54 | 137 |
|
55 | 138 | #set page(background: image("figures/zen.jpg", width: 100%, height: 100%)) |
|
0 commit comments