🐧 لینک گروه جامعه متن باز (لینوکس) ایرانhttps://t.iss.one/joinchat/BDE3OUs-jzRKVI8btbY4kA
Network Security with pfSense: Architect, deploy, and operate enterprise-grade firewalls
@iranopensource🐧
Network Security with pfSense: Architect, deploy, and operate enterprise-grade firewalls
@iranopensource🐧
Network Security with pfSense.pdf
9.6 MB
What you will learn
Understand what pfSense is, its key features, and advantages
Configure pfSense as a firewall
Set up pfSense for failover and load balancing
Connect clients through an OpenVPN client
Configure an IPsec VPN tunnel with pfSense
Integrate the Squid proxy into pfSense
Who this book is for
Network Security with pfSense is for IT administrators, security administrators, technical architects, chief experience officers, and individuals who own a home or small office network and want to secure it.
Table of Contents
Introduction To pfSense
pfSense As A Firewall
pfSense As A Failover And Load Balancer
Remote Connectivity With pfSense And IPSec
pfSense As A Squid Proxy Server @iranopensource🐧
Understand what pfSense is, its key features, and advantages
Configure pfSense as a firewall
Set up pfSense for failover and load balancing
Connect clients through an OpenVPN client
Configure an IPsec VPN tunnel with pfSense
Integrate the Squid proxy into pfSense
Who this book is for
Network Security with pfSense is for IT administrators, security administrators, technical architects, chief experience officers, and individuals who own a home or small office network and want to secure it.
Table of Contents
Introduction To pfSense
pfSense As A Firewall
pfSense As A Failover And Load Balancer
Remote Connectivity With pfSense And IPSec
pfSense As A Squid Proxy Server @iranopensource🐧
💎 هوش تهدید سایبری چیست؟
منظور از هوش تهدید سایبری یا CTI، دانشی است مبتنی بر شواهد تهدید که دربردارنده وضعیت، نشانگرها، ادله، سازوکارها، پیامدها و توصیه های قابل پیگیری در خصوص وجود یا به وجود آمدن خطر یا تهدیدی مرتبط با دارایی ها می باشد و می توان بر اساس آن، تصمیم و اقدام مناسبی را در پاسخ به تهدید اتخاذ نمود.
💎 لینک گروه الماس
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
@iranopensource🐧
منظور از هوش تهدید سایبری یا CTI، دانشی است مبتنی بر شواهد تهدید که دربردارنده وضعیت، نشانگرها، ادله، سازوکارها، پیامدها و توصیه های قابل پیگیری در خصوص وجود یا به وجود آمدن خطر یا تهدیدی مرتبط با دارایی ها می باشد و می توان بر اساس آن، تصمیم و اقدام مناسبی را در پاسخ به تهدید اتخاذ نمود.
💎 لینک گروه الماس
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
@iranopensource🐧
💎 لینک گروه الماس
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
Network Defense and Countermeasures: Principles and Practices 3rd Edition @iranopensource🐧
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
Network Defense and Countermeasures: Principles and Practices 3rd Edition @iranopensource🐧
Network_Defense_and_Countermeasures_.pdf
11.4 MB
=====Learn How To=====
· Evaluate key network risks and dangers
· Choose the right network security approach for your organization
· Anticipate and counter widespread network attacks, including those based on “social engineering”
· Successfully deploy and apply firewalls and intrusion detection systems
· Secure network communication with virtual private networks
· Protect data with cryptographic public/private key systems, digital signatures, and certificates
· Defend against malware, including ransomware, Trojan horses, and spyware
· Harden operating systems and keep their security up to date
· Define and implement security policies that reduce risk
· Explore leading security standards and models, including ISO and NIST standards
· Prepare for an investigation if your network has been attacked
· Understand the growing risks of espionage and cyberterrorism
· Evaluate key network risks and dangers
· Choose the right network security approach for your organization
· Anticipate and counter widespread network attacks, including those based on “social engineering”
· Successfully deploy and apply firewalls and intrusion detection systems
· Secure network communication with virtual private networks
· Protect data with cryptographic public/private key systems, digital signatures, and certificates
· Defend against malware, including ransomware, Trojan horses, and spyware
· Harden operating systems and keep their security up to date
· Define and implement security policies that reduce risk
· Explore leading security standards and models, including ISO and NIST standards
· Prepare for an investigation if your network has been attacked
· Understand the growing risks of espionage and cyberterrorism
لطفا رزومه های خود را به [email protected] ارسال فرمایید. @iranopensource🐧
استخدام در بانک خاورمیانه
💎 لینک گروه الماس
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
@iranopensource🐧
ارسال رزومه به : [email protected]
💎 لینک گروه الماس
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
@iranopensource🐧
ارسال رزومه به : [email protected]
☁️ لینک گروه تکنولوژی های ابری و مجازی سازی
https://t.iss.one/joinchat/BDE3OVH_RBXgwYZzbPZNqA
Mastering Identity and Access Management with Microsoft Azure: 2nd Edition @iranopensource🐧
https://t.iss.one/joinchat/BDE3OVH_RBXgwYZzbPZNqA
Mastering Identity and Access Management with Microsoft Azure: 2nd Edition @iranopensource🐧
Mastering_Identity_and_Access_Management.pdf
52.5 MB
========Table of Contents========
Building and Managing Azure Active Directory
Understanding Identity Synchronization
Exploring Advanced Synchronization Concepts
Monitoring Your Identity Bridge
Configuring and Managing Identity Protection
Managing Authentication Protocols
Deploying Solutions on Azure AD and ADFS
Using the Azure AD App Proxy and the Web Application Proxy
Deploying Additional Applications on Azure AD
Exploring Azure AD Identity Services
Creating Identity Life Cycle Management on Azure
Creating a New Security Culture
Identifying and Detecting Sensitive Data
Understanding Encryption Key Management Strategies
Configuring Azure Information Protection Solutions
Azure Information Protection Development Overview @iranopensource🐧
Building and Managing Azure Active Directory
Understanding Identity Synchronization
Exploring Advanced Synchronization Concepts
Monitoring Your Identity Bridge
Configuring and Managing Identity Protection
Managing Authentication Protocols
Deploying Solutions on Azure AD and ADFS
Using the Azure AD App Proxy and the Web Application Proxy
Deploying Additional Applications on Azure AD
Exploring Azure AD Identity Services
Creating Identity Life Cycle Management on Azure
Creating a New Security Culture
Identifying and Detecting Sensitive Data
Understanding Encryption Key Management Strategies
Configuring Azure Information Protection Solutions
Azure Information Protection Development Overview @iranopensource🐧
☁️ لینک گروه تکنولوژی های ابری و مجازی سازی
https://t.iss.one/joinchat/BDE3OVH_RBXgwYZzbPZNqA
HPE iLO 5 User Guide @iranopensource🐧
https://t.iss.one/joinchat/BDE3OVH_RBXgwYZzbPZNqA
HPE iLO 5 User Guide @iranopensource🐧
💎 لینک گروه الماس
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
CEH Certified Ethical Hacker Practice Exams, 4th Edition @iranopensource🐧
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
CEH Certified Ethical Hacker Practice Exams, 4th Edition @iranopensource🐧
CEH_Certified_Ethical_Hacker_Practice.pdf
4.7 MB
Fully updated for the CEH v10 exam objectives, this practical guide contains more than 600 realistic practice exam questions to prepare you for the EC-Council’s Certified Ethical Hacker exam. To aid in your understanding of the material, in-depth explanations of both the correct and incorrect answers are provided for every question. A valuable pre-assessment test evaluates your readiness and identifies areas requiring further study. Designed to help you pass the exam, this is the perfect companion to CEH™ Certified Ethical Hacker All-in-One Exam Guide, Fourth Edition. Covers all exam topics, including:
•Ethical hacking fundamentals
•Reconnaissance and footprinting
•Scanning and enumeration
•Sniffing and evasion
•Attacking a system
•Hacking web servers and applications
•Wireless network hacking
•Mobile and IoT
•Security in cloud computing
•Trojans and other attacks
•Cryptography
•Social engineering and physical security
•Penetration testing
•Ethical hacking fundamentals
•Reconnaissance and footprinting
•Scanning and enumeration
•Sniffing and evasion
•Attacking a system
•Hacking web servers and applications
•Wireless network hacking
•Mobile and IoT
•Security in cloud computing
•Trojans and other attacks
•Cryptography
•Social engineering and physical security
•Penetration testing
💎 لینک گروه الماس
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
Cyber Security Analyst (CSA+)-Sybex @iranopensource🐧
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
Cyber Security Analyst (CSA+)-Sybex @iranopensource🐧
💎 لینک گروه الماس
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
CompTIA Cybersecurity Analyst (CSA+)-Cert Guide @iranopensource🐧
https://t.iss.one/joinchat/BDE3OQ2LakQWk-JDHFiNaQ
CompTIA Cybersecurity Analyst (CSA+)-Cert Guide @iranopensource🐧