Cyber Slap Bracelets

Cyber Slap Bracelets

$2.50$25.00

SKU: N/A Categories: , Tag:

Description

The Command Line “Rosetta Stone” (orange) bracelet lets you translate between Bash, Windows command line and Powershell commands with a quick glance at your wrist.

The 5 Data Breach Risk Factors (orange) bracelet let you weigh the risks of the existing data that could be stolen in a breach.

The Emacs/Vi Reference (green) bracelet has the most important Vi/Emacs commands you might need in a pinch.

The How to Preserve Digital Evidence (green) bracelet is a handy checklist of things to do when you need to quickly preserve digital evidence.

The Cybersecurity Cheat Sheet (pink) bracelet lists all the fundamental commands for penetration testing, traffic sniffing, forensic imaging, and more.

The Don’t Get Hooked by Phishing Emails (blue) bracelet gives everyone in your organization the information they need to avoid phishing emails.

The IP protocol chart (yellow) Yep, that’s right. Now you can WEAR TCP/IP around as bling. w00t!

The TCP protocol chart (red) Yep, that’s right. Now you can WEAR TCP/IP around as bling. w00t!

The DRAMA (Data Breach Response Model) (black) bracelet provides helpful hints and tricks for how to successfully navigate responding to a data breach.

The Password and Login Tips (purple) bracelet puts the essential do’s and don’ts of password and login security within your grasp.

The ABCs of Cybersecurity (yellow) bracelet offers the basics for cybersecurity in an accessible format.

The How to Preserve Digital Evidence (purple) is a quick checklist of things to do when you need to quickly preserve digital evidence – now in purple!

The Anatomy of a Ransomware Attack (pink) raise awareness with this great visual guide to the steps involved in ransomware attack.

The Linux Command Line Cheat Sheet (green) a quick reference cheat sheet of commands.

FREE SHIPPING in the USA!

Please contact us directly for international orders – [email protected]

Additional information

Color

Yellow – ABC's of Cybersecurity, Purple – How to Preserve Digital Evidence, Pink – Anatomy of a Ransomware Attach, Green – Linux Command Line Cheat Sheet, Orange – Command Line Equivalents, Orange – Data Breach Risk Factors, Green – EMACS VI/VIM, Green – How to Preserve Digital Evidence, Pink – Cybersecurity Cheat Sheet, Blue – Phishing Emails, Yellow – IPv4 Protocol Chart, Red – TCP Protocol Chart, Black – Data Breach Response Model, Purple – Password and Login Tips, I WANT ALL OF THEM!

CONTACT US