Iran Open Source (IOS)
2.63K subscribers
6.69K photos
147 videos
1.69K files
1.16K links
کانال IOS:
💎 امنیت سایبری، امنیت اطلاعات، امنیت شبکه
💎 دوره‌های تخصصی شبکه، امنیت و دیتاسنتر
💎 مجازی‌سازی، پردازش ابری و ذخیره سازی
💎 معرفی کتاب
💎 اخبار IT، امنیت، هک و نفوذ

🌀 مدیر کانال: میثم ناظمی
@Meysam_Nazemi

🌀 مدیر تبلیغات: @MoNaITCU
Download Telegram
☁️ لینک گروه تکنولوژی های ابری و مجازی سازی
https://t.iss.one/joinchat/BDE3OVH_RBXgwYZzbPZNqA
@iranopensource🐧
Iran Open Source (IOS)
☁️ لینک گروه تکنولوژی های ابری و مجازی سازی https://t.iss.one/joinchat/BDE3OVH_RBXgwYZzbPZNqA @iranopensource🐧
AWS Tools for PowerShell 6 by Ramesh Waghmare #AWS #powershell #programming
-----------------------------
AWS Tools for PowerShell 6 shows you exactly how to automate all the aspects of AWS. You can take advantage of the amazing power of the cloud, yet add powerful scripts and mechanisms to perform common tasks faster than ever before.

This book expands on the Amazon documentation with real-world, useful examples and production-ready scripts to automate all the aspects of your new cloud platform. It will cover topics such as managing Windows with PowerShell, setting up security services, administering database services, and deploying and managing networking. You will also explore advanced topics such as PowerShell authoring techniques, and configuring and managing storage and content delivery.

By the end of this book, you will be able to use Amazon Web Services to automate and manage Windows servers. You will also have gained a good understanding of automating the AWS infrastructure using simple coding.
-------------------------------———————-
2017 | EPUB | 372 pages | 4.28 MB
-------------------------------———————-

@iranopensource🐧
Iran Open Source (IOS)
💎 لینک گروه الماس https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ @iranopensource🐧
Firewalls Don't Stop Dragons A Step-by-Step Guide to Computer Security for Non-Techies by Carey Parker #Firewalls #security
-----------------------------------
Rely on this practical, end-to-end guide on cyber safety and online security written expressly for a non-technical audience. You will have just what you need to protect yourself—step by step, without judgment, and with as little jargon as possible. Just how secure is your computer right now? You probably don't really know. Computers and the Internet have revolutionized the modern world, but if you're like most people, you have no clue how these things work and don't know the real threats.
Protecting your computer is like defending a medieval castle. While moats, walls, drawbridges, and castle guards can be effective, you'd go broke trying to build something dragon-proof. This book is not about protecting yourself from a targeted attack by the NSA; it's about armoring yourself against common hackers and mass surveillance. There are dozens of no-brainer things we all should be doing to protect our computers and safeguard our data—just like wearing a seat belt, installing smoke alarms, and putting on sunscreen.
Author Carey Parker has structured this book to give you maximum benefit with minimum effort. If you just want to know what to do, every chapter has a complete checklist with step-by-step instructions and pictures. The book contains more than 150 tips to make you and your family safer. It includes:
Added steps for Windows 10 (Spring 2018) and Mac OS X High Sierra
Expanded coverage on mobile device safety
Expanded coverage on safety for kids online
More than 150 tips with complete step-by-step instructions and pictures
----------------------------------———————
2018 | PDF | 411 pages | 17 MB
--------------------------------———————--

@iranopensource🐧
💎 بیانیه شرکت تپ سی در خصوص اطلاعات لو رفته 6.7 میلیون از رانندگان این شرکت
💎 لینک گروه الماس
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
@iranopensource🐧
Iran Open Source (IOS)
💎 لینک گروه الماس https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ @iranopensource🐧
Hacking World Class Hacking, Python and Cyber Security Strategies For Up-and-Coming Hackers by Hacking Studios #hacking #python #cybersecurity
----------------------------
Imagine Yourself…
Programming like a hacker, landing a software development job at Google and make a ton of money..
Being paid to hack programs, software and systems to find and plug loopholes..
Learn the best programming strategies and immediately outperform established hackers...
Taking the art of Python to a whole new level and become front figure...
Having control over the websites your kids are visiting and the chat programs they use..
Never worry about getting your computer hacked, your credit card information stolen, family photos taken from you and your everyday life put at risk..
Having the best online safety systems sat up immediately to protect your business from hackers..
If so, you’ve come to the right place
-------------------------------——————-
2017 | PDF | 133 pages | 960 KB
----------------------------———————

@iranopensource🐧
Iran Open Source (IOS)
💎 لینک گروه الماس https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ @iranopensource🐧
tors Hacker Manual A Hands-On Tutorial on Ethical Hacking from Zero to Advance by Alexis John Lingad #hacking #hacker #ethicalhacking
----------------------------------
CHAPTER 001: How to Start Hacking?
CHAPTER 002: Penetration Testing Execution Standards
CHAPTER 003: Information Gathering
CHAPTER 004: Vulnerability Analysis
CHAPTER 005: System Hacking
CHAPTER 006: Wireless Hacking
CHAPTER 007: Web Hacking
CHAPTER 008: Password Cracking
CHAPTER 009: Social Engineering
----------------------------------
2018 | PDF | 158 pages| 15,0 MB
--------------------------------

@iranopensource🐧
استخدام شرکت مهستان تجارت ارس
عنوان شغلی:
متخصص شبکه
شرایط احراز:
شرح وظایف:
نگهداری و توسعه سیستم های نرم افزاری و سخت افزاری دفاتر و انبارهای شرکت اعم ازserver, switch, router, radio و ....
نگهداری و توسعه سیستم VoIP Cisco
نگهداری، پشتیبان گیری از دیتای شرکت بویژه نرم افزار های مالی شرکت
همکاری با شرکت فروشنده نرم افزار مالی، برای رفع ایرادات و نصب بروز رسانی های احتمالی
راهبری، آموزش و رفع ایرادات کاربران در استفاده از رایانه و نرم افزارهای مالی شرکت
تحویل و تحول تجهیزات IT بین پرسنل شرکت و نگهداری موجودی اموال و دارایی ها
بروز رسانی مستمر نرم افزار ها و تجهیزات سخت افزاری برای بهره برداری مناسب از نرم افزار ها و کاهش قطعی احتمالی در اینترنت و شبکه
توانمندیهای مورد نیاز Network admin:
مسلط به مبانی شبکه و مایکروسافت و مهارت های مورد نیاز اعم از:
Active Directory, Skype for business, Exchange, WSUS, SharePoint
دارای سابقه و مهارت کافی در مجازی سازی بویژه VMWare و CITRIX
آشنایی با Firewall ها نظیر Kerio Control
مسلط بر کانفیگ روترهای میکروتیک
آشنایی با خطوی مخابراتی SIP Trunk
دارای سابقه راه اندازی، تنظیم و نگهداری VoIP cisco و سرورها و ابزارهای لازم در بهره گیری مناسب از VoIP نظیر CUCM, UCCX, Voice Gateway
ترجیحا دارای مدارک MCSE / MCITP, MTCNA, ESXI Virtualization, CISCO CCNA, CISCO Collaboration
متقاضیان محترم لطفا رزومه خود را به آدرس ایمیل زیر ارسال نمایند:
[email protected]

@iranopensource🐧
انوا BGP Attributeها @iranopensource🐧
☁️ لینک گروه تکنولوژی های ابری و مجازی سازی
https://t.iss.one/joinchat/BDE3OVH_RBXgwYZzbPZNqA
@iranopensource🐧
Iran Open Source (IOS)
☁️ لینک گروه تکنولوژی های ابری و مجازی سازی https://t.iss.one/joinchat/BDE3OVH_RBXgwYZzbPZNqA @iranopensource🐧
Mastering AWS Security by Albert Anthony #AWS #Amazon #security
—---------------------—
Who This Book Is For
This book is for all IT professionals, system administrators and security analysts, solution architects and Chief Information Security Officers who are responsible for securing workloads in AWS for their organizations. It is helpful for all Solutions Architects who want to design and implement secure architecture on AWS by the following security by design principle. This book is helpful for personnel in Auditors and Project Management role to understand how they can audit AWS workloads and how they can manage security in AWS respectively.

If you are learning AWS or championing AWS adoption in your organization, you should read this book to build security in all your workloads. You will benefit from knowing about security footprint of all major AWS services for multiple domains, use cases, and scenarios.
—---------------------——————————-
2017 | PDF | 350 pages | 10,5 MB
—---------------------——————————-

@iranopensource🐧