Jump to content

Search the Community

Showing results for tags 'security'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


  • Announcement
    • WE ARE BACK!!! -- ONLINE
  • TECHNICAL DISCUSSION (No Request Section).
    • AWS
    • Microsoft
    • Linux
    • AWS
    • Microsoft
    • LINUX
  • Other Certifications (Share & Request)
  • Vouchers
    • Vouchers
  • Job Opportunities
    • Jobs
  • Entertainment & OTT Platform
    • Entertainment & OTT Platform
  • Complain & Suggestions
    • Complain & Suggestions

Find results in...

Find results that contain...

Date Created

  • Start


Last Updated

  • Start


Filter by number of...


  • Start



About Me

  1. Hi all welcome back start registering here in the community more releases are coming soon. Please find the link [Hidden Content]
  2. This intermediate Microsoft Security Operations Analyst training covers the objectives in the SC-200 exam, which is the one required exam to earn the Security Operations Analyst certification. [Hidden Content]
  3. Cisco CCNP Security SCOR (Exam 350-701) by Anthony Sequeira, Ronnie Wong [Hidden Content] • Identify and mitigate network threats • Implement on-prem and cloud security • Understand modern cryptographic solutions • Utilize Python for security automation • Configure Cisco Firepower and Umbrella • Manage network security with Cisco tools Chapter 1 Network Security and Cryptography Fundamentals Chapter 2 Advanced Network Security and Configuration Techniques Chapter 3 Cloud Security Essentials Chapter 4 Cisco Security Solutions Configuration and Analysis Chapter 5 Endpoint Security and Management Strategies Chapter 6 Advanced Cisco Network Security Techniques [Hidden Content]
  4. For those of you who's looking for a Splunk Tutorial, click and enjoy. 😁 [Hidden Content]
  5. Linux Security Techniques [Hidden Content] What you will learn • Implement various Linux security features effectively. • Manage and audit logs with syslog and journald. • Secure filesystems and configure firewalls. • Protect services with SELinux and isolate applications. • Encrypt data using LUKS and GPG. • Perform security testing to verify configurations and data encryption. Chapter 1 Monitoring and Auditing Security Chapter 2 Data Security Chapter 3 Securing Services Chapter 4 Securing Networks Chapter 5 Security Testing [Hidden Content]
  6. *****OFFER****Don't waste your energy and time (GDRIVE LINK Collection) ****BOOM***** DIRECT LINK Catch it Before before disappearing
  7. Cisco CCNP Security SNCF (Exam 300-710) Anthony Sequeira/Ronnie Wong [Hidden Content] What you will learn • Configure AWS VPC for Cisco Firewall and IPS systems • Deploy and manage FMCv and NGFWv in AWS • Implement NGFW Routed and Transparent modes • Explore multi-instance deployments and clustering • Troubleshoot using CLI/GUI and perform packet capture • Enhance security with Cisco AMP and other integrations Chapter 1 Building a Practice Lab Chapter 2 Deployment Chapter 3 Management and Troubleshooting Chapter 4 Integration Chapter 5 Configuration [Hidden Content]
  8. CCNP and CCIE Security Core SCOR 350-701 (Exam Blueprint 1.1) by Omar Santos Released April 2024 Publisher(s): Pearson ISBN: 0138358222 Introduction Lesson 1 Introduction to the CCNP and CCIE Security Certifications Lesson 2 Cybersecurity Concepts Lesson 3 Network Security Lesson 4 Securing the Cloud Lesson 5 Content Security Lesson 6 Endpoint Protection and Detection Lesson 7 Identity Management and AAA Lesson 8 Secure Network Access, Visibility, and Enforcement Lesson 9 Preparing for the Exam Summary [Hidden Content]
  9. please anyone can get us this course Implementing IPSec You never know who's listening. Implementing IPsec for encrypting communication between sites is one of the first lines of defense in a Network Security Engineer's toolkit to prevent a data breach. In this course you will learn how to implement LAN-to-LAN IPsec Tunnels on both Cisco IOS and Juniper JunOS to provide secure connectivity between your network sites.
  10. Generative AI Security Conference by Omar Santos Released May 2024 Publisher(s): Pearson ISBN: 0135353327 Table of contents Introduction and Opening Remarks Is Your Network at Risk? How Can AI Help You? Revolutionizing Cybersecurity with an AI-Driven SOC Validating Generative AI: How to Secure Your Models and Data Closing Remarks [Hidden Content]
  11. Does Anybody has Sophos Certified Administrator XG Firewall official Learning Material including Training Videos?
  12. hi guys any any chance anyone has the - CKS Dump - Certified Kubernetes Security Specialist - Update------------ I took this test some days ago, this test is hard, I will update and add something later thanks a lot
  13. Palo Alto Networks Certified Network Security Administrator (PCNSA) Study Guide - Author: Palo Alto Networks - Format: PDF, 174 pages - First published: April 2022 - Link download: [Hidden Content]
  14. Hi All, JN0-230: Security, Associate (JNCIA-SEC) and JN0-334: Security, Specialist (JNCIS-SEC) Dumps Required on priority. TIA
  15. 32 TB (Mega)CYBER SECURITY Courses Including (INFOSEC Institute ,BALCKHAT Ethical Hacking, UDEMY Cybersecurity Courses) READ THE RULES MISSING [Offer] / [Req] in subject
  16. Free Download [OFFER] Spring Security 6 with JWT Published 1/2024 Created by Tushar Girase MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 21 Lectures ( 59m ) | Size: 376 MB Spring Security What you'll learn: Understand Spring Security Concepts Implement Spring Security in application Secure implementation of REST APIs Understanding of Spring Security module Requirements: Basic Knowledge of Spring Rest, Hibernate and JPA Basic Knowledge of Spring Boot Description: This course is intended for the beginners and experience Java developers working with spring framework. Security is an important aspect of the modern REST API. Spring security is the most popular and used framework to secure your application. It is important to understand the concepts of spring security and how it is implemented based on which you can have your own implementation of the Spring Security for your application to be more secure. JWT is again a most popular technology to implement the token based authentication and authorization. In this course you will learn about Core Concepts of Spring Security. We will deep dive into the spring security and its core concepts which are must for any developer who is working in spring framework. Will also look at the concepts and try to understand why the implementation is given in that way. For all possibilities of the customizations offered by spring security framework. We will implement the authentication and authorization using JWT tokens. In the end of the course we will implement an use case of Library Management System where all the authenticated users can access book records but only admins will be able to add new book records to system. Who this course is for: Beginner Spring Boot Developers Beginner /Experienced Java Developers Beginner /Experienced Spring MVC Developers Homepage Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live [hide] No Password - Links are Interchangeable
  17. CHFI - Digital Forensics and Cyber Crime with Kali Linux Fundamentals_13.5hrs - LL info : https://www.oreilly.com/library/view/digital-forensics-and/9780134693644/ [hide] https://mega.nz/file/KKJ1CKaA wgmkpywuRvMOtCXwcVNb2K5BU3Dxevmjk2bb74z1pY8 [/hide] Looking4more --> kali --> https://www.certcommunity.org/forum/topic/2121-offer-kali-linux-tutorial-beginners-packt/ --> kali --> https://www.certcommunity.org/forum/topic/2122-offer-kali-linux-2017-itprotv/ ! ! 🙂 Geia Mas ( cheers Mates !) 🙂 ! !
  18. This is our 5-day Advanced-level web application security testing course. Much like our popular Advanced Infrastructure Hacking class, this class talks about a wealth of hacking techniques to compromise web applications, APIs, cloud components and other associated end-points. This class focuses on specific areas of appsec and on advanced vulnerability identification and exploitation techniques (especially server side flaws). The class allows attendees to practice some neat, new and ridiculous hacks which affected real life products and have found a mention in real bug-bounty programs. The vulnerabilities selected for the class either typically go undetected by modern scanners or the exploitation techniques are not so well known. Note: Attendees will also benefit from a state-of-art Hacklab and we will be providing free 30 days lab access after the class to allow attendees more practice time. Course Overview Advanced Web Hacking course talks about a wealth of hacking techniques to compromise web applications, APIs and associated end-points. This course focuses on specific areas of app-sec and on advanced vulnerability identification and exploitation techniques (especially server side flaws). This hands-on course covers neat, new and ridiculous hacks which affected real life products and have found a mention in real bug-bounty programs. In this course vulnerabilities selected are ones that typically go undetected by modern scanners or the exploitation techniques are not so well known. Course Details You will be able to: • Effectively exfiltrate data using Out of Band Techniques for certain vulnerabilities • Pen Test encrypted parameters to find vulnerabilities • Learn how to bypass SSO functionalities • Find SQL injection vulnerabilities not detected by Automated tools • Break weak crypto implementations • Learn ways to bypass password reset functionalities You will receive: Access to a hacking lab not just during the course but for 30 days after the class too. This gives them plenty of time to practice the concepts taught in the class. Numerous scripts and tools will also be provided during the training, along with student handouts. Our courses also come with detailed answer sheets. That is a step by step walkthrough of how every exercise within the class needs to be solved. These answer sheets are also provided to students at the end of the class. What you can take away from the course: • The latest hacks in the world of web hacking. The class content has been carefully handpicked to focus on some neat, new and ridiculous attacks. • We provide a custom kali image for this class. The custom kali image has been loaded with a number of plugins and tools (some public and some NotSoPublic) and these aid in quickly identifying and exploiting vulnerabilities discussed during the class. • The class is taught by a real Pen Tester and the real-world stories shared during the class help attendees in putting things into perspective. Prerequisites Who Should Take This Class? • Web developers • SOC analysts • Intermediate level penetration testers • DevOps engineers, network engineers • Security architects • Security enthusiasts • Anyone who wants to take their skills to the next level You will need: Students must bring their own laptop and have admin/root access on it. The laptop must have a virtualization software (virtualbox / VMWare) pre installed. A customized version of Kali Linux (ova format) containing custom tools, scripts and VPN scripts for the class will be provided to the students. The laptop should have at least 4 GB RAM and 20 GB of free disk space dedicatedly for the VM. General Info: Publisher : NotSoSecure Language : English Updated : 2022 Duration : 5h+ Course Source : https://notsosecure.com/security-training/advanced-web-hacking [hide] magnet:?xt=urn:btih:33B07E61F9510025361EB75DB0042259FB823970&dn=NotSoSecure+%7C+Advanced+Web+Hacking+%5BFCO%5D&tr=udp%3A%2F%2Ftracker.torrent.eu.org%3A451%2Fannounce&tr=udp%3A%2F%2Ftracker.tiny-vps.com%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.jordan.im%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.moeking.me%3A6969%2Fannounce&tr=udp%3A%2F%2Fexodus.desync.com%3A6969%2Fannounce&tr=udp%3A%2F%2Fexplodie.org%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2780%2Fannounce&tr=udp%3A%2F%2Ffe.dealclub.de%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.openbittorrent.com%3A1337%2Fannounce&tr=udp%3A%2F%2Fopen.stealth.si%3A80%2Fannounce&tr=udp%3A%2F%2F9.rarbg.to%3A2900%2Fannounce&tr=udp%3A%2F%2F9.rarbg.me%3A2720%2Fannounce&tr=udp%3A%2F%2Fipv4.tracker.harry.lu%3A80%2Fannounce&tr=udp%3A%2F%2Ftracker.opentrackr.org%3A1337%2Fannounce&tr=http%3A%2F%2Ftracker.openbittorrent.com%3A80%2Fannounce&tr=udp%3A%2F%2Fopentracker.i2p.rocks%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.internetwarriors.net%3A1337%2Fannounce&tr=udp%3A%2F%2Ftracker.leechers-paradise.org%3A6969%2Fannounce&tr=udp%3A%2F%2Fcoppersurfer.tk%3A6969%2Fannounce&tr=udp%3A%2F%2Ftracker.zer0day.to%3A1337%2Fannounce [/hide]
  19. SEC504 - Hacker Tools, Techniques, Exploits, and Incident Handling pdf - 2019 videoz - 2018 R: https://www.sans.org/cyber-security-courses/hacker-techniques-incident-handling/ R-flyer : https://www.sans.org/brochure/course/hacker-techniques-incident-handling/3765 [hide] https://mega.nz/file/0nYTwKLa xzKakNentPPNm4qzpHncQUJ1T6GqBspM47yFjlsKyko [/hide] Enjoy !
  20. SEC511 - Continuous Monitoring and Security Operations pdf2019vid2019 Focus Area : Cyber Defense R : https://www.sans.org/cyber-security-courses/continuous-monitoring-security-operations/ [hide] https://mega.nz/file/42xnlDzS AVW6OkADJCPPtdmcfAWFp3xv-ab3GzWIholqlKsicME [/hide] Enjoy
  21. Free Download [OFFER] Cloud Security and Audit Fundamentals - AWS, Microsoft Azure, and Google Cloud Released 11/2023 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Skill Level: Beginner | Genre: eLearning | Language: English + srt | Duration: 2h 27m | Size: 347 MB Are you interested in learning more about the cloud, but not sure where to begin? This beginner-level skills development course equips you with baseline technical know-how on implementing basic security techniques in cloud computing, specifically in AWS, Microsoft Azure and Google Cloud. Join instructor Michael Ratemo for a comprehensive overview of the key elements of the cloud, how to secure each of these three cloud platforms, and how to evaluate the effectiveness of your security processes and protocols as you go. Michael covers auditing considerations for identity and access management, security in cloud virtual machines, virtual networks, cloud security in storage, and more. By the end of this course, you'll also be prepared to start leveraging cloud-native security posture management (CSPM) tools including AWS Security Hub, Microsoft Defender for Cloud, and Google Security Command Center. Homepage Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live [hide] No Password - Links are Interchangeable
  22. Free Download [OFFER] ITProTV - Certified Information Security Manager (CISM) Last updated 1/2024 MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English + srt | Duration: 13h 49m | Size: 5 GB Certified Information Security Manager (CISM) certification is the pinnacle for individuals aspiring to excel in Information Security Management. This course empowers you to showcase your expertise in security practices and validates your knowledge in this critical domain. In this comprehensive course, embark on a journey through four key sections: Information Security Governance, Risk Management, Information Security Program Development, and Incident Management. Uncover essential strategies, frameworks, and techniques encompassing governance principles, risk assessment methodologies, security program construction, and incident handling practices. Explore how to integrate security requirements seamlessly into IT operations, align strategies with business objectives, and effectively manage and mitigate incidents. Understanding these domains isn't just about passing the CISM exam; it's about gaining expertise to excel in today's cybersecurity landscape. Delve into regulatory impacts, risk assessment methodologies, security policy development, and incident response strategies. Equip yourself to align security programs with business objectives, analyze emerging threats, and navigate incident categorization and post-incident reviews. What you will learn Integrate governance principles into operations effectively Manage security risks using robust assessment methodologies Implement incident management aligned with regulations Identify and categorize incidents for prompt resolution Create essential policies for organizational resilience Ace post-incident reviews for continuous improvement Audience This course is tailored for aspiring or current information security professionals aiming to pursue the Certified Information Security Manager (CISM) certification. Prerequisites for this course include a basic understanding of information security concepts and familiarity with IT governance frameworks. Homepage Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live [hide] No Password - Links are Interchangeable
  23. CCIE Practice Labs from C1sco or via CLN - The new CCIE Practice labs let you explore fully functional, hands-on lab environments in four-hour sessions. see more info
  24. Free Download [OFFER] Comprehensive Security Course (CSC) Published 1/2024 Created by Lazaro (Laz) Diaz MP4 | Video: h264, 1280x720 | Audio: AAC, 44.1 KHz, 2 Ch Genre: eLearning | Language: English | Duration: 18 Lectures ( 6h 33m ) | Size: 5.45 GB Security for Server, Networking Devices & Security Concepts What you'll learn: They will learn the basics of how networks are structured, common vulnerabilities and the principles of securing a network They will learn about different types of networking devices and how to properly secure them. They will learn the importance of firewalls in a perimeter network They will learn how to configure ACL at different layers of your Network. Requirements: A basic understanding of Networking. Description: Introduction to the Course- "Through this course, we will give you a comprehensive introduction to Network Security. Indeed, we will explain the technical concepts; the level will therefore be accessible to everyone. If you already have computer prerequisites, this will undoubtedly be useful, but it is not mandatory."Starting with the Basics- "In the first learning section, we will speak on the security professional, threats to cyber security, types of security attacks, and physical security."Mitigation Techniques"Next, we will discuss several topics on how we can mitigate attacks through the use of ACLs, VACLs, and also a variation of Named ACLs as well as look into securing WLAN networks."Dive into Microsoft Server and Active Directory- "Through the final section, we will briefly look into the Microsoft server, specifically the active directory to centralize the login, and security for all user accounts and end devices."- "Understanding active directories when working in a Microsoft environment is crucial to the company. Within an active directory not only can you harden user accounts through the use of GPOs and file sharing permissions, but also an array of many other security enhancements that AD provides, such as CAs, group permissions, and creating least privileged policies."Conclusion and Key Takeaways- "In conclusion, this course will give you a lot of technical and conceptual information for you to be able to secure a network with at least the minimum guidelines. When it comes to security, you must use a layered approach and add some sort of security from top to bottom." Who this course is for: This course is for individuals looking to enter network or security engineering positions. Homepage Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live [hide] No Password - Links are Interchangeable
  25. Free Download [OFFER] Cyber Security Audit Champion Published 1/2024 MP4 | Video: h264, 1920x1080 | Audio: AAC, 44.1 KHz Language: English | Size: 916.55 MB | Duration: 2h 40m Cybersecurity audit What you'll learn Identify and comprehend the various security controls implemented within an organization Understand the importance of policies in maintaining a secure environment and ensuring employee awareness and compliance Gain insights into the organization's security architecture and design principles Assess the security of the organization's network infrastructure Evaluate the effectiveness of security awareness programs Assess the security posture of third-party vendors and partners Understand and undertake controls for Cybersecurity Governance, Application Security, Cloud Security, Change and Patch Management, Data Privacy, Data Protection Understand and undertake controls for Endpoint Security, Identity and Access Management, Incident Handling Understand and undertake controls for Operations Technology Security Monitoring, Internet of Things (IoT), Network Security, Understand and undertake controls for Recovery and Continuity, Security Monitoring and Operations Requirements Basic Audit Knowledge is desirable No need of technical IT Audit knowledge. You will learn everything in this course for cybersecurity audit Description This comprehensive training course is designed to equip Internal Auditors, cybersecurity professionals with the knowledge and skills necessary to conduct thorough audits across various domains critical to a robust cybersecurity posture. Participants will delve into key areas such as cybersecurity governance, application security, cloud security, change and patch management, data privacy, data protection, endpoint security, identity and access management, incident handling, operations technology security monitoring, Internet of Things (IoT), network security, recovery and continuity, and security monitoring and operations.Key Domains Covered:Cybersecurity Governance:Explore the principles and practices of establishing effective cybersecurity governance frameworks.Learn to assess and enhance organizational cybersecurity policies and procedures.Application Security:Analyze and evaluate the security measures in place for applications, focusing on secure coding practices and vulnerability management.Cloud Security:Understand the unique challenges and solutions associated with securing cloud-based infrastructures and services.Change and Patch Management:Explore best practices for managing changes and implementing timely patching to mitigate vulnerabilities.Data Privacy and Protection:Delve into regulations and standards governing data privacy and protection, and assess the organization's compliance.Endpoint Security:Evaluate the security controls and measures implemented to safeguard endpoints and user devices.Identity and Access Management:Understand the importance of controlling access to systems and data, and assess the effectiveness of identity and access management practices.Incident Handling:Develop skills for identifying, responding to, and mitigating the impact of security incidents.Operations Technology Security Monitoring:Explore security monitoring techniques tailored for operational technology environments.Internet of Things (IoT):Assess the security implications and risks associated with IoT devices and ecosystems.Network Security:Evaluate the security architecture and controls implemented to protect the organization's network infrastructure.Recovery and Continuity:Explore strategies for disaster recovery and business continuity planning to ensure resilience in the face of cyber incidents.Security Monitoring and Operations:Learn effective techniques for continuous security monitoring and optimizing security operations.Methodology:Lectures with explanationHands-on practical examplesAudit ProgramsQuizzesThis training course is ideal for cybersecurity professionals, auditors, and IT professionals seeking to enhance their expertise in assessing and improving cybersecurity measures across diverse organizational domains. Upon completion, participants will be equipped with the skills needed to conduct comprehensive cybersecurity audits and contribute to the ongoing security and resilience of their organizations. Overview Section 1: Introduction Lecture 1 Introduction Lecture 2 Important Guidance Lecture 3 How to use the Cybersecurity Audit Program Lecture 4 Complete Audit Program File Section 2: Domain 1 Cybersecurity Governance Lecture 5 Cybersecurity Governance Audit Lecture 6 Cybersecurity Governance Audit Program Section 3: Domain 2 - Cybersecurity Application Security Lecture 7 Cybersecurity Application Security Audit Lecture 8 Cybersecurity Application Security Audit Program Section 4: Domain 3 - Cybersecurity Cloud Security Lecture 9 Cybersecurity Cloud Security Audit Lecture 10 Cybersecurity Cloud Security Audit Program Section 5: Domain 4 - Cybersecurity Change and Patch Management Lecture 11 Cybersecurity Change and Patch Management Audit Lecture 12 Cybersecurity Change and Patch Management Audit Porgram Section 6: Domain 5 Cybersecurity Data Privacy Lecture 13 Cybersecurity Data Privacy Lecture 14 Cybersecurity Data Privacy Audit Porgram Section 7: Domain 6 Cybersecurity Data Protection Lecture 15 Cybersecurity Data Protection Lecture 16 Cybersecurity Data Protection Audit Program Section 8: Domain 7 Cybersecurity Endpoint Security Lecture 17 Cybersecurity Endpoint Security Lecture 18 Cybersecurity Endpoint Security Audit Program Section 9: Domain 8 Cybersecurity Identity and Access Management Lecture 19 Cybersecurity Identity and Access Management Lecture 20 Cybersecurity Identity and Access Management Audit Program Section 10: Domain 9 Cybersecurity Incident Handling and Response Lecture 21 Cybersecurity Incident Handling and Response Lecture 22 Cybersecurity Incident Handling and Response Audit Program Section 11: Domain 10 Cybersecurity Operations Technology Security Monitoring Lecture 23 Cybersecurity Operations Technology Security Monitoring Lecture 24 Cybersecurity Operations Technology Security Monitoring Audit Program Section 12: Domain 11 Cybersecurity Internet of Things (IoT) Lecture 25 Cybersecurity Internet of Things (IoT) Lecture 26 Cybersecurity Internet of Things (IoT) Audit Program Section 13: Domain 12 Cybersecurity Network Security Lecture 27 Cybersecurity Network Security Lecture 28 Cybersecurity Network Security Audit Program Section 14: Domain 13 Cybersecurity Recovery and Continuity Lecture 29 Cybersecurity Recovery and Continuity Lecture 30 Cybersecurity Recovery and Continuity Audit Program Section 15: Domain 14 Cybersecurity Security Monitoring and Operations Lecture 31 Cybersecurity Security Monitoring and Operations Lecture 32 Cybersecurity Security Monitoring and Operations Audit Program Internal Auditor,IT Auditors,External Auditors,Information Technology Officers,CISO Homepage Recommend Download Link Hight Speed | Please Say Thanks Keep Topic Live [hide] No Password - Links are Interchangeable
  • Create New...