Chapters¶
Nexus SecOps comprises 58 chapters organized into 7 parts. Each chapter is a hand-rewritten reference: opinionated, named recommendations, specific failure modes, no filler.
Part I -- Foundations (Ch 1-6)¶
The everyday SOC: telemetry, normalization, SIEM, detection engineering, triage, and threat intelligence. Start here if you are new to security operations.
Part II -- Automation, AI, and Operating Model (Ch 7-15)¶
SOAR done honestly, IR lifecycle, AI/ML in the SOC (and where it doesn't fit), LLM copilots and guardrails, compliance/privacy/AI-risk, threat modeling integration, operating model and SLAs, gamification.
Part III -- Architecture and Cryptography (Ch 16-22)¶
Penetration testing program design, network security architecture, applied cryptography, identity and access security, cloud attack and defense, container security.
Part IV -- Specializations and Sector Domains (Ch 23-29)¶
Mobile security, OT/ICS, malware analysis foundations, advanced incident response, threat hunting, deception, advanced threat hunting playbooks.
Part V -- Operations Engineering (Ch 30-37)¶
Detection-as-code, network security architecture, applied cryptography, identity, DevSecOps pipeline integration, threat modeling, AI security, supply chain.
Part VI -- Red Team and Adversary Tradecraft (Ch 38-48)¶
Hunting methodology (PEAK/TaHiTI), zero trust implementation, security program leadership, incident response leadership, OSINT/ASM, social engineering, web app pentest, post-exploitation, cloud and container red teaming, AD escalation, exploit dev concepts.
Part VII -- Intelligence and Emerging Threats (Ch 49-58)¶
Threat intelligence operations, adversarial AI/LLM security, Kubernetes security, API security, zero-day response, SBOM operations, threat modeling operations, privacy engineering, cloud forensics, compliance automation.
Method¶
All 58 chapters were rewritten by hand between sessions 36-43 against scripts/voice_quality_check.py. Average score 8 (target <50). Original ~58,500 lines reduced to ~12,650 (~78% reduction). Bias was always toward the named tool with the honest tradeoff over the comprehensive-sounding survey.
To browse a specific chapter, use the navigation tabs above or search.