IT and Information Security Cheat Sheets

As much as we try to be proactive about information security, IT planning, or project management, we get distracted, or procrastinate. These information security cheat sheets, checklists and templates are designed to assist IT professionals in difficult situations, even if they find themselves unprepared.

Tips For Getting the Right IT Job

Practical tips for finding and getting the right job in information technology:


REMnux Usage Tips for Malware Analysis on Linux

Key tools and commands for analyzing malicious software on the REMnux Linux distribution:


Tips for Creating an Information Security Assessment Report

This cheat sheet presents recommendations for creating a strong report as part of an information security assessment project.


Critical Log Review Checklist for Security Incidents

Checklist for reviewing critical logs when responding to a security incident. It can also be used for routine log review, co-authored with Anton Chuvakin:


Analyzing Malicious Documents Cheat Sheet

Tips and tools for reverse-engineering malicious documents, such as Microsoft Office (DOC, XLS, PPT) and Adobe Acrobat (PDF) files:


Security Architecture Cheat Sheet for Internet Applications

Tips for the initial design and review of a complex Internet application’s security architecture:


Troubleshooting Human Communications

Communication tips for technologists, engineers, and information workers:


Security Incident Survey Cheat Sheet for Server Administrators

Tips for examining a potentially-compromised server to decide whether to escalate for formal incident response:


Initial Security Incident Questionnaire for Responders

The questions the incident handler should consider asking when taking control of a qualified incident:


Network DDoS Incident Response Cheat Sheet

Advice for battling a network DDoS attack on your infrastructure:


Reverse-Engineering Malware Cheat Sheet

Shortcuts and tips for analyzing malicious software:


Information Security Assessment RFP Cheat Sheet

Tips for planning, issuing and reviewing RFPs for information security assessments:


How to Suck at Information Security

Common information security mistakes, so you can avoid making them:


Report Template for Threat Intelligence and Incident Response


A report template and framework for for capturing key details related to a large-scale intrusion and documenting them in a comprehensive, well-structured manner.


About the Author

Lenny Zeltser is a business and tech leader with extensive experience in information technology and security. His areas of expertise include incident response, cloud services and product management. Lenny focuses on safeguarding customers' IT operations at NCR Corporation. He also teaches digital forensics and anti-malware courses at SANS Institute. Lenny frequently speaks at conferences, writes articles and has co-authored books. He has earned the prestigious GIAC Security Expert designation, has an MBA from MIT Sloan and a Computer Science degree from the University of Pennsylvania.

Learn more