<?xml version="1.0" encoding="utf-8"?><feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en-US"><generator uri="https://jekyllrb.com/" version="4.1.1">Jekyll</generator><link href="https://aadityakhati.com.np/feed.xml" rel="self" type="application/atom+xml" /><link href="https://aadityakhati.com.np/" rel="alternate" type="text/html" hreflang="en-US" /><updated>2024-01-19T01:10:51+05:45</updated><id>https://aadityakhati.com.np/feed.xml</id><title type="html">Aaditya Khati</title><subtitle>Aaditya Khati is a Cyber Security Professional with expertise on defensive security solutions and services. As a team lead and manager for blue team at CryptoGen Nepal, he is responsible for managing the Security Operations Center (SOC) team, handling incident, and overseeing the SOC projects. His experience includes Offensive Security, Security Information and Event Management (SIEM), Web Application Firewall (WAF), eXtended Detection and Response (XDR), Endpoint Detection and Response (EDR), EndPoint Protection (EPP), Security Orchestration, Automation and Response (SOAR), Network Monitoring, and more. He also holds certification related to various platforms and cyber security deciplines such as F5 101, LRPA, LRDE, LRSE, LRSA, Tenable.io, NSE, Cisco CyberOps, ISC2 Certified in Cyber Security and more.</subtitle><author><name>Aaditya Khati</name><email>aaditya.khati@hotmail.com</email></author><entry><title type="html">Welcome to my blog</title><link href="https://aadityakhati.com.np/welcome-to-my-blog/" rel="alternate" type="text/html" title="Welcome to my blog" /><published>2023-03-14T13:00:00+05:45</published><updated>2023-03-14T13:00:00+05:45</updated><id>https://aadityakhati.com.np/welcome-to-my-blog</id><content type="html" xml:base="https://aadityakhati.com.np/welcome-to-my-blog/"><![CDATA[<p>Hi, this is my first blog on this site. I want to share my experiences and researches performed during the course of my professional journey. I started my Cyber Security journey as a Network Penetration Tester and moved my way towards defensive security. For those who are planning their career and making their way through the cyber security.</p>

<p>Let’s break down the three major cyber security domains:</p>
<h2 id="1-offensive-security">1. Offensive Security</h2>

<p>Offensive Security consists of assessments to try breaking into systems by exploiting services, human aspects, common knowledge and gaining access for further operations. Offensive Security Experts, also known as ‘Hackers’ are eqquiped with tools and techniques to successfully conduct hacking operations. Red team, Vulnerability Assessment and Penetration Testing can be one of the starting points for you to look into, if you are planning to jump into this as a career. There are also many security professionals who also perform bug bounty on organizations that have Vulnerability Disclosure Program (VDP) and Bug Bounty Program (BBP). The main difference between these two are BBP offers monetary rewards while VDP might provide public acknowledgements, swags or points.</p>

<h2 id="2-defensive-security">2. Defensive Security</h2>

<p>Defensive Security has a wide varity of sub domains, network administrators, security engineers, security analysts, digital forensics and incident handlers. People who have knowledge about the basics of network architecture, cyber security, common policy knowledge can begin their career as a Security Analysts. Organizations have started building their own Security Operations Center (SOC) department and many opt in for a third party service provider which is commonly known as MSP or Managed Service Provider.</p>

<h2 id="3-governance-risk-and-compliance-grc">3. Governance, Risk and Compliance (GRC)</h2>

<p>GRC deals with strategy, risk, compliance, audit, legal, IT, HR and more. The GRC team overviews the risk management and complaince requirements that are to be met by an organization. IS Auditors are one of the domains for enthusiasts that want to explore in this field. Certifications such as, CISA, CISM, CGRC, CISSP, ITIL 4 Foundation are some of the certifications one can pursue to get a foothold on this domain. Certifications only do not qualify an individual in this domain, some of the certification requirements also requires you to have 4-5 years of auditing experience before being a certified professional.</p>

<h2 id="start-learning">Start Learning</h2>

<p>Either you want to start or have already been</p>]]></content><author><name>Aaditya Khati</name><email>aaditya.khati@hotmail.com</email></author><category term="cyber" /><category term="security" /><category term="blog" /><category term="cyber security" /><category term="getting started" /><summary type="html"><![CDATA[Hi, this is my first blog on this site. I want to share my experiences and researches performed during the course of my professional journey. I started my Cyber Security journey as a Network Penetration Tester and moved my way towards defensive security. For those who are planning their career and making their way through the cyber security.]]></summary></entry></feed>