Desired Wiki Pages
Desired Wiki Pages
Section titled “Desired Wiki Pages”This is a list of desired pages for the wiki. Community members are encouraged to create these pages and help us grow our collective knowledge. If you have an idea for a page, feel free to create it and add it to the appropriate section.
1. Blue Teaming and Defensive Operations
Section titled “1. Blue Teaming and Defensive Operations”- Reasoning: The wiki is heavily skewed towards offensive cybersecurity. While a personal cyber incident response guide exists (Cyber Incident Response Guide (Personal)), a dedicated page on broader defensive concepts like threat hunting, SIEM usage (e.g., Splunk, ELK Stack), and incident response would fill a major gap. This page would serve as a higher-level overview or a follow-on to the personal guide, focusing on organizational or team-based defensive strategies.
- Suggested Location:
cybersecurity/defensive-operations.md
2. Cloud Security Fundamentals
Section titled “2. Cloud Security Fundamentals”- Reasoning: With numerous guides on self-hosting and cloud services, a page on securing those environments is a critical missing piece. This should cover the Shared Responsibility Model, IAM best practices, and container security.
- Suggested Location:
cybersecurity/cloud-security.md
3. Overhaul the cybersecurity/index.md Page
Section titled “3. Overhaul the cybersecurity/index.md Page”- Reasoning: The current page is a glossary. It should be rebuilt as a portal, similar to
ai-ml/index.md, with clear sections for Offensive, Defensive, Cloud, and Application Security. The glossary should be moved to its own file. - Suggested Location:
cybersecurity/index.mdandcybersecurity/glossary.md
4. Operationalizing AI: From Model to Application
Section titled “4. Operationalizing AI: From Model to Application”- Reasoning: The wiki has excellent guides on running local LLMs. The logical next step is a guide on how to use those models in a practical application, such as building a simple API or fine-tuning a model for a specific analytical task.
- Suggested Location:
ai-ml/operationalizing-ai.md
5. Red Teaming and Evaluating AI/LLMs
Section titled “5. Red Teaming and Evaluating AI/LLMs”- Reasoning: For a security-conscious audience, understanding how to test and break AI models is crucial. This page would cover prompt injection, data leakage testing, and evaluating models for bias and robustness.
- Suggested Location:
ai-ml/ai-red-teaming.md
6. Advanced Flipper Zero Use Cases
Section titled “6. Advanced Flipper Zero Use Cases”- Reasoning: The community’s interest in RF and hardware hacking is evident. A guide on advanced uses for the popular Flipper Zero tool (e.g., rolling code analysis, advanced NFC emulation) would be highly relevant.
- Suggested Location:
radio/flipper-zero-advanced.md
7. Building a Secure Communications Environment
Section titled “7. Building a Secure Communications Environment”- Reasoning: This page would synthesize several existing guides (
mobile-hardening,tailscale,matrix) into a single, actionable guide for setting up a comprehensive, secure communications capability. - Suggested Location:
privacy/secure-communications-guide.md
8. Infrastructure as Code (IaC) for the Homelab
Section titled “8. Infrastructure as Code (IaC) for the Homelab”- Reasoning: A natural evolution for the
server-guidessection. This page would introduce Ansible or Terraform to automate the deployment of the services mentioned elsewhere in the wiki. - Suggested Location:
server-guides/iac-ansible-guide.md
9. Creating a Technical Project Portfolio
Section titled “9. Creating a Technical Project Portfolio”- Reasoning: To support career-focused members, this guide would explain how to document projects into a professional portfolio, which is especially valuable for those transitioning from military service.
- Suggested Location:
community/technical-portfolio-guide.md
10. Advanced OSINT Techniques and OPSEC
Section titled “10. Advanced OSINT Techniques and OPSEC”- Reasoning: OSINT is a core topic but is currently scattered. A centralized page could cover advanced techniques while heavily emphasizing the Operational Security (OPSEC) to conduct research safely.
- Suggested Location:
research/advanced-osint.md
If you are interested in creating one of these pages, please feel free to do so. Your contributions are what make this community great.