Network_Protocols_for_Security_Professionals_Probe_and_identify.epub
26.2 MB
• Дата выхода: 2022 год.
• Рейтинг:
• This book is a comprehensive guide that begins with the basics, gradually increases in complexity, and later takes you through advanced concepts. You will start by understanding the structure of data network protocols and devices as well as breaches. In addition to this, you’ll become familiar with attacking tools and scripts that take advantage of these breaches. Next, you will perform eavesdropping, learn data analysis, and use behavior analysis for network forensics. Toward the concluding chapters, you will understand network protocols and how to use methods and tools you learned in the previous parts to attack and protect these protocols.#network #Security #Eng
@sysadmin1
Please open Telegram to view this post
VIEW IN TELEGRAM
👍4❤1🔥1😁1
CompTIA_Network+_Certification_All_in_One_Exam_Guide,_Eighth_Edition.epub
78.9 MB
• Дата выхода: 2022 год.
• Рейтинг:
• Network architectures;• Cabling and topology;• Ethernet basics;• Network installation;• TCP/IP applications and network protocols;• Routing;• Network naming;• Advanced networking devices;• IPv6;• Remote connectivity;• Wireless networking;• Virtualization and cloud computing;• Mobile networking;• Network operations;• Managing risk;• Network security;• Network monitoring and troubleshooting.#Network #Eng
@sysadmin1
Please open Telegram to view this post
VIEW IN TELEGRAM
👍2
Learn Wireshark.pdf
17.9 MB
• Дата выхода: 2022 год.
• Рейтинг:
What you will learn:
• Master network analysis and troubleshoot anomalies with Wireshark;• Discover the importance of baselining network traffic;• Correlate the OSI model with frame formation in Wireshark;• Narrow in on specific traffic by using display and capture filters;• Conduct deep packet analysis of common protocols: IP, TCP, and ARP;• Understand the role and purpose of;• ICMP, DNS, HTTP, and DHCP;• Create a custom configuration profile and personalize the interface;• Create I/O and stream graphs to better visualize traffic.#Eng #network #Wireshark
@sysadmin1
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2👍1🔥1🎉1
Omada Controller Software.pdf
3.7 MB
🔥3👍2❤1🤩1
Hacking.of.Computer.Networks.pdf
22.7 MB
• Дата выхода: 2018 год.
• Рейтинг:
• The objective of the book is to summarize to the user with main issues in certified ethical hacker course. The complete book consists of many parts:
- Part 1: Lab Setup;
- Part2: Foot printing and Reconnaissance;
- Part 3: Scanning Methodology;
- Part 4: Enumeration;
- Part 5:System Hacking;
- Part 6: Trojans and Backdoors and Viruses;
- Part 7: Sniffer and Phishing Hacking;
- Part 8: Hacking Web Servers;
- Part 9: Hacking Windows and Linux Systems;
- Part 10: Wireless Hacking;
- Part 11: Hacking Mobile Applications.
#Eng #Networks #Hack
@sysadmin1
Please open Telegram to view this post
VIEW IN TELEGRAM
👍4❤2🤩1
• Nmap — культовый сканер, без которого не может обойтись практически ни один хакер. Это мощный и сложный инструмент, код которого вылизывался десятилетиями. Он быстрый, надежный и невероятно функциональный. А главное — полностью бесплатный и работает практически везде.
• Материал будет полезен как новичкам так и специалистам, которые активно используют этот инструмент в работе:
• Host Discovery;
• Output Format Scan;
• Understanding Nmap Packet Trace;
• Nmap Scan with Timing Parameters;
• Nmap Scans using Hex Value of Flags;
• Forensic Investigation of Nmap Scan using Wireshark;
• Understanding Guide for Nmap Timing Scan (Firewall Bypass);
• Understanding Guide for Nmap Ping Scan (Firewall Bypass);
• Comprehensive Guide on Nmap Port Status;
• How to Detect NMAP Scan Using Snort;
• Understanding Guide to Nmap Firewall Scan (Part 2);
• Understanding Guide to Nmap Firewall Scan (Part 1);
• Understanding Nmap Scan with Wireshark;
• Password Cracking using Nmap;
• Vulnerability Scan;
• Network Scanning using NMAP (Beginner Guide);
• MSSQL Penetration Testing using Nmap;
• MySQL Penetration Testing with Nmap.
#ИБ #Eng #Nmap
@sysadmin1
Please open Telegram to view this post
VIEW IN TELEGRAM
👍2❤1🔥1
CEH_–_Certified_Ethical_Hacker_v11_+1200_Exam_Practice_Questions.pdf
3.4 MB
• Дата выхода: 2021 год.
• Рейтинг:
• IP Specialists' Practice Questions are dedicatedly designed from a certification exam perspective. The collection of these questions from our Study Guides are prepared keeping the exam blueprint in mind, covering not only important but necessary topics as well. It's an ideal document to practice and revise your certification.#CEH #Eng
@sysadmin1
Please open Telegram to view this post
VIEW IN TELEGRAM
👍2😁1🎉1🤩1
ISC2_Certified_Information_Systems_Security_Professional_CISSP_Realistic.epub
331.1 KB
• Дата выхода: 2022 год.
• Рейтинг:
What you will learn:
• Security and Risk Management;
• Asset Security;
• Security Architecture and Engineering;
• Communication and Network Security;
• Identity and Access Management (IAM);
• Security Assessment and Testing;
• Security Operations;
• Software Development Security;
#Eng #security #CISSP
@sysadmin1
Please open Telegram to view this post
VIEW IN TELEGRAM
❤1👍1🔥1😁1
Network Security Private Communications in a Public World.epub
7.7 MB
• Дата выхода: 2022 год.
• Рейтинг:
What you will learn:
• Network security protocol and cryptography basics;
• Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3);
• First-generation public key algorithms (RSA, Diffie-Hellman, ECC);
• How quantum computers work, and why they threaten the first-generation public key algorithms;
• Quantum computers: how they work, and why they threaten the first-generation public key algorithms;
• Multi-factor authentication of people;
• Real-time communication (SSL/TLS, SSH, IPsec);
• New applications (electronic money, blockchains);
• New cryptographic techniques (homomorphic encryption, secure multiparty computation).
#Eng #Security #Network
@sysadmin1
Please open Telegram to view this post
VIEW IN TELEGRAM
❤2👍1🔥1
• Держите полезный плейлист, в котором представлен разбор базовых атак на Active Directory:
• Pass-the-Hash Attack Using Mimikatz;
• Plaintext Password Extraction through Group Policy Preferences;
• AdminSDHolder Modification;
• Ntds.dit Password Extraction;
• Performing Reconnaissance Using LDAP;
• DCSync Attack Using Mimikatz Detection;
• DCShadow Attack Using Mimikatz;
• Password Spraying;
• Kerberos Silver Ticket;
• Kerberoasting;
• Golden Ticket;
• Pass-the-Cookie;
• AD Attribute Takeover;
• Lateral Movement.
#AD #Eng
@sysadmin1
Please open Telegram to view this post
VIEW IN TELEGRAM
🔥6👍2❤1🤩1