❌

Normal view

There are new articles available, click to refresh the page.
Before yesterdayMain stream

A lesson in personal cybersecurity (2022)

By: seo_spec
7 January 2023 at 14:45
Download now!

Description:

How we can help you save money and your reputation?

We’ll tell and show you by real examples:

  • Why simple and repeated passwords are dangerous
  • Who needs your data and why
  • The pitfalls of public wifi
  • How bank cards are stolen
  • Pros and cons of dual authentication
  • How to easily access your phone
  • What smart homes and assistants keep quiet about

    Also, let’s talk about topics:

    • Digital Hygiene
    • Antivirus, VPN and other protection
    • Online extortion
    • Surveillance of intelligence services and not only
    • Who needs your intimate photos
    • Online porn, dangers and precautions
  • Network vulnerability analysis

    By: seo_spec
    7 January 2023 at 14:30
    Download now!

    Description:

    If you want to learn how to defend or attack networks, one of the most important thing is the ability to detect and analyze vulnerabilities in systems or networks.

    In this course, you will learn how to follow a systematic process and use it to detect and handle potential vulnerabilities. At . first, you’ll learn passive and active scanning techniques for vulnerabilities. Next, you’ll learn how to extract the results from the data and analyze them to identify vulnerabilities that can be attack, or identify risks that need to be minimize. Finally, you’ll learn how to apply the three most popular vulnerability scanners and compare them with each other. At the end of the course, you will have have the knowledge and skills needed to identify vulnerabilities and take take action.

    Course content:

    • Introduction
    • Preparing the tools
    • Virtual Machines
    • OWASP Broken Web Applications
    • Metasploitable 2
    • Nmap
    • Vulnerability scanning methodology
    • Search targets to work around without penetration
    • Find targets to work around with penetration
    • Port and service discovery/scanning
    • Vulnerability detection
    • Find Internet vulnerabilities effectively
    • Types of vulnerability scans
    • Passive scan
    • Active scan
    • Vulnerability scanning
    ❌
    ❌