Rajneesh Gupta
@rajneeshg7
Zero to CyberHero ๐Coach | Mission to help 100k people get to Cybersecurity by 2025 | Follow for Career tips
ID: 755930303336632320
https://zaap.bio/haxsecurity 21-07-2016 01:00:03
1,1K Tweet
2,2K Followers
751 Following
๐๐ซ๐๐๐ค ๐ฒ๐จ๐ฎ๐ซ ๐๐ฒ๐๐๐ซ๐ฌ๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ ๐๐ง๐ญ๐๐ซ๐ฏ๐ข๐๐ฐ ๐ฐ๐ข๐ญ๐ก ๐๐] Question: What is IDS and IPS? And how are they different? ๐ดWatch the Full Video lnkd.in/d4UuwcuS ๐ Retweet if youโve found this useful
๐ฅ[๐๐๐ ๐๐๐ ๐๐จ๐ฆ๐ฉ๐ฅ๐ข๐๐ง๐๐- ๐๐ ๐๐๐ช๐ฎ๐ข๐ซ๐๐ฆ๐๐ง๐ญ๐ฌ]๐ฅ If you are a GRC analysts or Security analyst or aspirant SOC analyst, knowledge of PCI DSS compliance will help you excel in your career path. #CyberSecurity
๐ ๐ฅ[๐๐ ๐๐ข๐ซ๐๐ฌ๐ก๐๐ซ๐ค ๐ ๐ข๐ฅ๐ญ๐๐ซ๐ฌ ๐๐จ๐ซ ๐๐๐ฅ๐ฐ๐๐ซ๐ ๐๐๐ญ๐๐๐ญ๐ข๐จ๐ง๐ฌ]๐ฅ๐ Display filters in Wireshark allow you to focus on specific types of network traffic. In this list, Iโll share 10 Most important Wireshark Filters to detect Malicious traffic. If youโre
๐๐๐๐ฌ๐ฌ ๐ฒ๐จ๐ฎ๐ซ ๐๐๐๐ฎ๐ซ๐ข๐ญ๐ฒ+ ๐๐ฑ๐๐ฆ๐ What type of attack involves an attacker putting a layer of code between an original device driver and the operating system? A.ย ย ย Refactoring B.ย ย ย Trojan horse C.ย ย ย Shimming D.ย ย ย Pass the hash
๐๐ ๐๐ก๐๐ฌ๐๐ฌ ๐จ๐ ๐๐ญ๐ก๐ข๐๐๐ฅ ๐๐๐๐ค๐ข๐ง๐ ๐ โก๏ธPlanning and Reconnaissance: Understanding the target and its vulnerabilities through information gathering. โญTechniques: Open Source Intelligence (OSINT), footprinting, social media analysis. โก๏ธScanning: Actively
๐ฑ๐ฅ[๐๐๐ ๐๐๐๐๐๐ซ ๐๐๐๐ - ๐๐จ๐ฆ๐ ๐๐๐]๐ฅ๐ฉโ๐ป This is the powerful home-lab focused on setting up IBM QRadar SIEM and real-world use cases. If youโre interested to become SOC Analyst(Tier 1/2) , this lab will help you with SOC tools, rules, queries, apps and
๐งโ๐ป๐ฅ[Malware Analysis Home-Lab v1.0]๐ฅ๐ฉโ๐ป Malware analysis is the process of dissecting and studying malicious software (malware) to understand how it works, what it does, and how to defend against it. If youโre a SOC Analyst or Aspirant SOC Analyst, this list will help you.