Jump to content
×
×
  • Create New...

jiomatian

Members
  • Posts

    148
  • Joined

  • Last visited

11 Followers

About jiomatian

Recent Profile Visitors

The recent visitors block is disabled and is not being shown to other users.

jiomatian's Achievements

Veteran

Veteran (13/14)

  • Well Followed Rare
  • One Month Later
  • Dedicated
  • Collaborator
  • Week One Done

Recent Badges

8k

Reputation

  1. Deploying and Managing Linux on Azure - LL Info : [Hidden Content]# [Hidden Content]
  2. [offer] DP-200 _ 201 - BestDotNetTraining info :[Hidden Content] [Hidden Content]
  3. [offer] RedTeam - Getting Access by M.Allen part2 [ data such as VMs etc ] [Hidden Content]
  4. DESCRIPTION Getting a foothold is the first step in a successful breach—be it in the form of user credentials, email access, or code execution on a target system. This course will provide students with the fundamental skills and know-how to perform the most common attacks used to get an initial foothold during a red team exercise. Since Microsoft products and services are the most widespread platform in use by organizations, Office 365 and Microsoft Windows will be the primary targets of student exercises. Core concepts will also be discussed so that students can apply the lessons learned to other platforms in the future. KEY TAKEAWAYS Students will learn OPSEC considerations when performing each step from reconnaissance to initial foothold. Students will learn how to counter modern defenses that can interfere with each attack. Students will learn how to set up an environment for testing each attack before running it against targets. Students will get hands-on practice: Performing reconnaissance to support each attack. Setting up their own “botnet” with ProxyCannon to spread traffic across multiple source IP addresses. Executing password guessing attacks such as credential stuffing and password spraying. Phishing for credentials and sessions to bypass multi-factor authentication. Setting up and using Azure Information Protection (AIP) to deliver encrypted phishing emails. Creating “MalDocs”—Microsoft Office documents with embedded executable payloads. Delivering executable payloads during a phishing campaign. R : [Hidden Content] [Hidden Content]
  5. EC-Council- Certified Ethical Hacker CEH v11 [2022] - Labs - Tools -Videoz - pdfs [Hidden Content] Enjoy !
  6. AZ800 - Learn Active Directory Hybrid Active Directory Domain Services Training - CBTN Info: Learn Active Directory: Hybrid Active Directory Domain Services Training release date @ 05/04/2022 DevOps | Cloud Technologies by James Conrad, Knox Hutchinson This intermediate Learn Active Directory: Hybrid Active Directory Domain Services training prepares DevOps professionals to support your hybrid infrastructure with an Active Directory Domain Services environment that provid [Hidden Content]
  7. CompTIA Security+ , Security Threats, Attacks, and Vulnerabilities [Domain 1.0] - cbtn Info: Domains: The latest version of Security+ SY0-601 have 5 Domains: Domain 1.0: Attacks, Threats, and Vulnerabilities (24%) Domain 2.0: Architecture and Design (21%) Domain 3.0: Implementation (25%) Domain 4.0: Operations and Incident Response (16%) Domain 5.0: Governance, Risk, and Compliance (14%) [Hidden Content]
  8. Fundamental Data Security in the Cloud - cbtn [released 22JUn ] nfo : Cyber and Network Security ISACA 31 videos This intermediate Fundamental Data Security in the Cloud training prepares security professionals to provide a basic level of security to cloud data networks, whether hybrid or completely in the cloud [Hidden Content]
  9. Penetration Testing Tools Online Training 19HRS - cbtn [ released 2021Feb ] R : [Hidden Content] [Hidden Content] ---> TOC <--- Skill: Pentesting Reconnaissance Skill: Pentest Enumeration and NMAP Skill: Enumerating Services and Vulnerabilities Skill: Social Engineering Attacks and Tools Skill: Exploits and Payloads Skill: Metasploit Framework Skill: Network-Based Attacks and Tools Skill: Host Protocol Attacks and Tools Skill: Wireless and Mobile Device Attacks and Tools Skill: Web Application Vulnerabilities Skill: Web Application Pentesting Skill: All About Shells Skill: Windows Localhost Vulnerabilities, Attacks, and Tools Skill: Linux Localhost Vulnerabilities, Attacks, and Tools Skill: Physical Penetration Testing Skill: Credential Attacks Skill: Performing Attacks on Cloud Technologies Skill: Attacks and Vulnerabilities of Specialized Systems Skill: Post Exploit Activities Skill: Scripting Basics Skill: Analyzing Scripts
  10. (CKA) Linux Foundation Certification Training ,16HRS - CBTN [ realesed date 2022Mar ] R: [Hidden Content] Kubernetes Administrator (CKA) [Hidden Content]
  11. GettingStartedwithContainers ,6hrs - O`REILLY-LL R: [Hidden Content] [Hidden Content] Enjoy ωρε Κυβερνήτες ( Kuvernites ) ! ! -) ! !
  12. Angular Material Theming Workshop (Advanced, 2021) - SS R : [Hidden Content] [Hidden Content]
  13. Angular Basics Online Training 27+hrs- cbtn R : [Hidden Content] [Hidden Content]
  14. AZ-500 - cbtn R : [Hidden Content] [Hidden Content]
  15. AZ-500 MVA R: [Hidden Content] [Hidden Content] Enjoy!