Last update 03.11.2024
Discover our Learning Path section here
Purchase UNLIMITED ACCESS with 40% OFF only this month
PAID subscriptions helps us improving WikiPages availability, performance and brings new content faster with high quality.
For (FREE) access Register and Login with OpenProdkt
Take parts into OpenProdkt WIKI survey. Your opinion matters!
Title | Description | Access | Created At |
---|---|---|---|
Cyber Security Politics | This book examines new and challenging political aspects of cyber security and presents it as an issue defined by socio-technological uncertainty and political fragmentation. | - | 2024-10-31 10:01 |
Attacking pfSense | Firewall/Router Secure Dev | - | 2024-10-31 09:54 |
NTLM Downgrade Attack_ Internal Monologue | Credential Dumping: Internal Monologue | - | 2024-10-30 18:27 |
Memory Forensics Volatility Framework &Workbench | Memory forensics is a division of digital forensics that generally emphasizes extracting artefacts from the volatile memory of a system that was compromised. | - | 2024-10-30 18:10 |
Cyber Threat Modelling for Risk Assessment | GUIDELINE TO CYBER THREAT MODELLING FOR RISK ASSESSMENT | (FREE) | 2024-10-30 17:40 |
Complete guide to CIDR, IP addresses and subnetting | Complete Guide to CIDR, IP Addresses, and Subnetting | - | 2024-10-30 17:33 |
Selenium Testing | Top 100 Selenium Interview Questions & Answers | - | 2024-10-30 17:31 |
Penetration Testing Commands | Penetration Testing Commands | - | 2024-10-30 02:34 |
Common Interview Questions for a SOC analyst career | Preparing for a SOC Analyst role? Learn the most common interview questions and how to ace them. | (FREE) | 2024-10-30 01:48 |
asset-based risk management | Overview of asset-based risk management, a process focusing on identifying, assessing, and prioritizing risks related to an organization’s assets (e.g., data, infrastructure) to protect critical resources and ensure continuity | - | 2024-10-26 16:14 |
Mastering API Methods | Overview of API methods (GET, POST, PUT, DELETE) used in RESTful services for data retrieval, creation, updating, and deletion, essential for client-server communication in web applications | - | 2024-10-26 15:00 |
cyber security governance | An overview of cybersecurity governance, focusing on the frameworks, policies, and processes that organizations implement to manage and protect their information assets, ensuring compliance and risk management | - | 2024-10-26 11:34 |
networking overview | Overview of networking fundamentals, covering IP addressing, protocols, OSI model, LAN, WAN, and key devices like routers and switches, providing a base for understanding data communication | (FREE) | 2024-10-26 10:08 |
terraform most asked interview questions | A collection of commonly asked Terraform interview questions, covering key concepts like providers, state management, modules, and essential commands to help candidates prepare effectively. | - | 2024-10-26 09:47 |
k8s Best Practice (Second Edition) | Kubernetes best practices focused on optimizing deployment, security, resource management, monitoring, and scaling to ensure efficient, resilient applications | - | 2024-10-25 18:41 |
100+ linux command | A command-line instruction in Linux used to perform specific tasks such as file manipulation, process management, network configuration, and system monitoring | - | 2024-10-24 15:53 |
How To Use Wireshark | The Ultimate Guide to Ultimate Network Protocol | - | 2024-10-24 14:35 |
Ansible for AWS | "" | - | 2024-10-24 13:41 |
AI For Cybersecurity | Application of AI in cybersecurity | - | 2024-10-24 13:25 |
DORA ECIIA | IMPACT OF THE DIGITAL OPERATIONAL RESILIENCE ACT ON THE INTERNAL AUDIT FUNCTION | - | 2024-10-23 09:26 |
Ethical Hacking with Python | Ethical Hacking with Python Programming | - | 2024-10-23 05:54 |
STEP-BY-STEP HOW TO GET HANDS ON EXPERIENCE WITH SIEM (SPLUNK) | A practical guide to gaining hands-on experience with SIEM (Splunk), covering step-by-step instructions for mastering essential skills. | - | 2024-10-21 15:50 |
Az-104 | All about Azure Portal, CLI and Powershell. | - | 2024-10-21 15:38 |
Introduction to Devops on AWS. | This paper highlights AWS capabilities that help you accelerate your DevOps journey, and how AWS services can help remove the undifferentiated heavy lifting associated with DevOps adaptation. | - | 2024-10-20 11:54 |
File Path Traversal - 1 | File path traversal is a vulnerability allowing unauthorized access to restricted files via manipulated input. | - | 2024-10-20 11:28 |
Introducing Google Cloud | Overview of cloud computing | - | 2024-10-19 14:42 |
Google Cloud Professional Cloud Architect | Learning Path | - | 2024-10-19 11:30 |
04 Choosing Storage Solutions | Module of Reliable Google Cloud Infrastructure Design and Process | - | 2024-10-19 08:55 |
09 Maintenance and Monitoring | Module of Reliable Google Cloud Infrastructure Design and Process | - | 2024-10-19 08:35 |
08 Security | Module of Reliable Google Cloud Infrastructure Design and Process | - | 2024-10-19 08:33 |
07 Designing Reliable Systems | Module of Reliable Google Cloud Infrastructure Design and Process | - | 2024-10-19 08:31 |
06 Deploying Applications to Google Cloud | Module of Reliable Google Cloud Infrastructure Design and Process | - | 2024-10-19 08:29 |
05 Google Cloud and Hybrid Network Architecture | Module of Reliable Google Cloud Infrastructure Design and Process | - | 2024-10-19 08:27 |
03 DevOps Automation | Module of Reliable Google Cloud Infrastructure Design and Process | - | 2024-10-19 08:25 |
Microservice Design and Architecture | Module of Reliable Google Cloud Infrastructure Design and Process | - | 2024-10-19 08:24 |
01 Defining Services | Module of Reliable Google Cloud Infrastructure Design and Process | - | 2024-10-19 08:06 |
00 Introduction | Introduction to Reliable Google Cloud Infrastructure Design and Process | - | 2024-10-19 08:02 |
ISOIEC 27001 Implementation Guide | ISOIEC 27001 Implementation Guide | - | 2024-10-19 07:52 |
Module 5: Managing Implementation and Ensuring Solution and Operations Reliability | Module 5 of Preparing for your Professional Cloud Architect Journey | - | 2024-10-19 07:49 |
Module 4: Analyzing and Optimizing Technical and Business Processes | Module 4 Preparing for Your Professional Cloud Architect Journey | - | 2024-10-19 07:44 |
Module 3: Designing for Security and Compliance | Module 3 of Preparing for Your Professional Cloud Architect Journey | - | 2024-10-19 07:42 |
Module 2: Managing and Provisioning a Solution Infrastructure | Module 2 of Preparing for Your Professional Cloud Architect Journey | - | 2024-10-19 07:40 |
Module 1: Designing and Planning a Cloud Solution Architecture | Designing and Planning a Cloud Solution Architecture. | - | 2024-10-19 07:24 |
Course Summary: Google Cloud Fundamentals: Core Infrastructure | Course Summary | - | 2024-10-19 07:19 |
Applications in the Cloud | Here attention to developing applications in the cloud by exploring Cloud Run and Cloud Functions. | - | 2024-10-19 07:14 |
Containers in the Cloud | In this section of the course, we’ll explore containers and help you understand how they are used. | - | 2024-10-18 21:27 |
Storage in the Cloud | Every application needs to store data - for example, media to be streamed or perhaps even sensor data from devices - and different applications and workloads require different storage database solutions. | - | 2024-10-18 21:22 |
Virtual Machines and Networks in the Cloud | In this module, we’re going to explore how Google Compute Engine works, with a focus on virtual networking. | - | 2024-10-18 21:01 |
Resources and Access in the Cloud | In this section of the course, we’ll see how resources get organized with projects, and how access to those resources gets shared with the right part of a workforce through a tool called Identity and Access Management, or IAM. | - | 2024-10-18 20:56 |
Google Cloud Fundamentals: Core Infrastructure | What exactly is Google Cloud? How is it organized? And what makes it unique? | - | 2024-10-18 20:47 |
Google Cloud Fundamentals: Core Infrastructure | welcome to the Google Cloud Fundamentals: Core Infrastructure training course. | - | 2024-10-18 20:34 |
Virtual Machines | In this module, we cover virtual machine instances, or VMs. | - | 2024-10-18 20:23 |
Virtual Networks | In this module, we will be covering virtual networks. | - | 2024-10-18 20:16 |
Interacting with Google Cloud | This module is focused on how to interact with Google Cloud. | - | 2024-10-18 20:11 |
Architecting with Google Compute Engine | welcome you to Architecting with Compute Engine, a series of 3 courses. | - | 2024-10-18 20:07 |
Review: Essential Cloud Infrastructure: Core Services | Review of Essential Cloud Infrastructure: Core Services | - | 2024-10-18 19:56 |
Resource Management | In this module, we will cover Resource Management. Resources in Google Cloud are billable, so managing them means controlling cost. | - | 2024-10-18 19:50 |
Storage and Database Services | In this module, we cover storage and database services in Google Cloud. Every application needs to store data, whether it's business data, media to be streamed, or sensor data from devices. | - | 2024-10-18 19:44 |
Identity and Access Management | In this module, we cover Identity and Access Management (or IAM) | - | 2024-10-17 09:58 |
Managed Services | As an alternative to infrastructure automation, you can eliminate the need to create infrastructure by leveraging a managed service. | - | 2024-10-17 09:40 |
Infrastructure Automation | how to automate the deployment of Google Cloud infrastructure. | - | 2024-10-17 09:30 |
Load Balancing and Autoscaling | In this module we focus on Load Balancing and Autoscaling. | - | 2024-10-17 09:25 |
Top 100 SOC Analyst Interview Questions and Answers : 2024 | Top 100 SOC Analyst Interview Questions and Answers from Fundamentals. | - | 2024-10-16 01:25 |
Guide to Bluetooth Security - NIST | This publication provides information on the security capabilities of Bluetooth and gives recommendations to organizations employing Bluetooth wireless technologies on securing them effectively. | - | 2024-10-16 01:02 |
Kubernets questions | 100 Kubernetes Real-Time Use Cases | - | 2024-10-09 14:40 |
Zero Trust Architecture | Zero trust (ZT) is the term for an evolving set of cybersecurity paradigms that move defenses from static, network-based perimeters to focus on users, assets, and resources | - | 2024-10-09 01:49 |
A Detailed Guide on Feroxbuster | Feroxbuster is a robust tool designed to identify directories and files on web servers using brute-force techniques. | - | 2024-10-09 00:33 |
Andriod Penetration Tester Drozer | Drozer is an android application security testing framework developed by FSecureLABS that makes it easy for a tester to create test cases and check for possible vulnerabilities in the components of an application. | - | 2024-10-08 23:15 |
SQL Server Failover Cluster (Active_Passive) DR Drill | A step-by-step guide for performing disaster recovery drills on SQL Server Failover Clusters (Active/Passive). | - | 2024-10-08 17:04 |
Alerting Policies | Alerting gives timely awareness to problems in your cloud applications so you can resolve the problems quickly. | - | 2024-10-07 20:59 |
Monitoring Critical Systems | how Google Cloud helps you monitor critical systems | - | 2024-10-07 20:51 |
Introduction to Google Cloud Operations Suite | this module with a quick introduction to Google Cloud operations suite. | - | 2024-10-07 20:41 |
Google Certified Security Engineer | Learning Path | - | 2024-10-07 17:34 |
SOC Concepts and Questions | An introduction to System on Chip (SoC) concepts and design | - | 2024-10-05 08:20 |
GUIDE TO AWS EKS- | This article provides a comprehensive guide to AWS Elastic Kubernetes Service (EKS), a fully managed Kubernetes service by Amazon Web Services | (FREE) | 2024-09-29 16:10 |
Data Structures and Algorithm- | This article covers the fundamental concepts of Data Structures and Algorithms (DSA), providing a comprehensive overview of various data structures, their applications, and essential algorithms used in computer science. | (FREE) | 2024-09-29 15:24 |
Content-Related Vulnerabilities: Techniques and Best Practices- | Content-Related Vulnerabilities: Techniques and Best Practices module | - | 2024-09-28 22:04 |
Monitoring, Logging, Auditing, and Scanning- | Monitoring, Logging, Auditing, and Scanning module | - | 2024-09-28 22:00 |
Protecting against Distributed Denial of Service Attacks (DDoS)- | Techniques and Best Practices module | - | 2024-09-28 21:56 |
Securing Google Kubernetes Engine: Techniques and Best Practices- | Securing Google Kubernetes Engine Techniques and Best Practices module | - | 2024-09-28 21:52 |
Application Security: Techniques and Best Practices- | Module 2 of Security Best Practices in Google Cloud | - | 2024-09-28 21:48 |
Securing Cloud Data: Techniques and Best Practices- | The Techniques and Best Practices module, part of the Security in Google Cloud course. | - | 2024-09-28 21:42 |
Securing Compute Engine: Techniques and Best Practices- | first module of Security Best Practices in Google Cloud | - | 2024-09-28 21:35 |
Module 4: Configuring Virtual Private Cloud for Isolation and Security- | VPC related security concepts including VPC firewalls, load balancing SSL policies, network interconnect and peering options, VPC service controls, and access context manager, VPC flow logs, and Cloud IDS. | - | 2024-09-28 21:29 |
Module 3: Identity and Access Management (IAM)- | Identity and Access Management | - | 2024-09-28 21:23 |
Module 2: Securing Access to Google Cloud- | Managing Security in Google Cloud | - | 2024-09-27 21:19 |
Cyber Security- | Learning Path | - | 2024-09-23 05:09 |
Cisco Nexus Switch Configuration- | The process of setting up, managing, and optimizing Cisco Nexus switches for network infrastructure, enabling efficient data flow, security, and scalability in data centers | - | 2024-09-17 12:46 |
Foundations of Google Cloud Security - | Welcome to the Foundations of Google Cloud Security module. | - | 2024-09-16 12:07 |
Module 4: Network Monitoring and Troubleshooting- | how to leverage monitoring and logging features in Google Cloud to troubleshoot network issues. | - | 2024-09-16 12:00 |
Module 4: Load Balancing- | The fourth and final module of the Networking in Google Cloud: Defining and Implementing Networks course. | - | 2024-09-16 11:54 |
Module 3: Sharing Networks across Projects- | Networking in Google Cloud: Defining and Implementing Networks course | - | 2024-09-16 11:45 |
Module 3: Network Billing and Pricing- | Network Billing and Pricing module | - | 2024-09-16 11:21 |
Module 2: Private Connection Options- | implementing internal access to Google and third-party resources | - | 2024-09-15 22:25 |
Module 2: Controlling Access to VPC Networks- | second module of the Networking in Google Cloud: | - | 2024-09-15 22:19 |
Networking in Google Cloud: Hybrid Connectivity- | Hybrid Connectivity | - | 2024-09-15 22:11 |
Networking in Google Cloud 01- | Module 1: Google Cloud VPC (Virtual Private Cloud) Networking Fundamentals | - | 2024-09-15 22:03 |
Networking in Google Cloud - | Course Series (00) | - | 2024-09-14 20:49 |
Windows Forensic Commands - | Windows forensic post exploit command | - | 2024-09-13 18:50 |
Web Testing- | Test Scenarios For Website Testing | - | 2024-09-13 18:47 |
Windows API For Red Team - | Windows API for Red Team #101 | - | 2024-09-13 18:43 |
WAF- | - | 2024-09-13 18:36 | |
DevSecOps Continuous Authorization Implementation Guide- | Department of Defense, Office of the Chief Information Officer (DoD CIO) | - | 2024-09-13 18:28 |
Network Security Guide- | Network Security & CyberOps Revision | - | 2024-09-13 17:39 |
Understanding Email and Email Security- | Mastering Email Understanding Email and Email Security A NIST Cybersecurity Perspective | - | 2024-09-13 17:35 |
Docker, Tips & commands- | Tips & commands | - | 2024-09-13 17:24 |
Computer Hacking Forensics Investigator (CHFI) Exam Notes - | CHFI Exam Notes | - | 2024-09-13 17:20 |
CKA- | Certified Kubernetes Administrator | - | 2024-09-09 19:34 |
Kubernetes Administator- | Learning Path | - | 2024-09-08 17:21 |
Ethical Hacking- | The practice of intentionally probing and testing systems, networks, or applications for vulnerabilities to improve security by identifying and fixing potential threats. | - | 2024-09-04 19:14 |
NIST Trustworthy and Responsible AI NIST AI 100-5- | A Plan for Global Engagement on AI Standards | - | 2024-08-29 22:53 |
Configuring OSPF- | This module describes how to configure Open Shortest Path First (OSPF). | - | 2024-08-28 20:39 |
JWT Handbook - | JSON Web Token HANDBOOK | - | 2024-08-28 10:26 |
Platform Engineering- | What You Need To Know Now | (FREE) | 2024-08-28 10:18 |
Working with Cloud Audit Logs- | In this module, we investigate the core Cloud Audit Logs that Google Cloud collects. | - | 2024-08-28 10:08 |
Advanced Logging and Analysis - | some of Google Cloud's advanced logging and analysis capabilities. | - | 2024-08-28 10:04 |
AWS Certified Solutions Architect Associate Notes - | Solutions Architect Associate exam? | - | 2024-08-28 09:56 |
Ansible: Up and Running- | Automating Configuration Management and Deployment the Easy Way | - | 2024-08-28 09:49 |
Ansible for Devops (Chapter 1-4)- | Server and Configuration Management for human | - | 2024-08-28 09:37 |
3.1 Interconnecting Networks- | Interconnecting Networks | - | 2024-08-28 08:43 |
200+ Linux Technical Interview Questions- | Linux Technical Interview Questions: | - | 2024-08-28 08:38 |
Python Cheat Sheet- | We can take this book as a basic syntax manual because its entries are arranged alphabetically so that we can easily reference the important syntax. Its purpose is as a supplement for a cheat sheet book, not as a whole Python dictionary. | - | 2024-08-28 01:49 |
DevOps Engineer- | Learning Path | (FREE) | 2024-08-27 10:33 |
Challenges in cyber-security and privacy- | Advanced cyberattacks that threaten privacy and security. | - | 2024-08-26 20:58 |
Cyber security terms- | cyber security terms in summary | - | 2024-08-26 20:43 |
Wireless Penetration Testing- | Techniques and tools for conducting penetration testing on wireless networks. | - | 2024-08-25 17:43 |
Networking - Complete guide for DevOps- | "" | - | 2024-08-25 17:39 |
Red Team Interview Questions v1.0- | A collection of interview questions specifically designed for red team roles in cybersecurity. | (FREE) | 2024-08-25 17:35 |
PowerShell for Pentester_ Windows Reverse Shell- | PowerShell for Pentester: Windows Reverse Shell | - | 2024-08-25 17:31 |
Modernizing Enterprise Java eBook- | A Concise Cloud Native Guide for Developers | - | 2024-08-25 17:26 |
Code Auditing tool _ Semgrep - | Code audit tool: Semgrep | - | 2024-08-25 17:19 |
DevSecOps- | DevSecOps Checklist | (FREE) | 2024-08-25 17:15 |
Business Logic Vulnerabilities - | Top Business Logic Vulnerability in Web | - | 2024-08-25 17:11 |
Board of Directors Handbook for Cloud Risk Governance- | A handbook for board members on managing and governing cloud-related risks. | - | 2024-08-25 17:06 |
Windows Post-Exploitation Command Execution- | Commands and techniques for post-exploitation activities on Windows systems. | - | 2024-08-18 09:21 |
Splunk CheatSheet Guide - | splunk Cheat Sheet | - | 2024-08-14 22:17 |
Python Interview Questions- | Company Wise Python Interview Questions | (FREE) | 2024-08-14 22:16 |
Jenkins Notes- | For continuous integration and for continuous deployment | - | 2024-08-14 22:12 |
Network Traffic & Flow Analysis - | Methods and tools for analyzing network traffic and flow to detect anomalies and ensure security. | - | 2024-08-14 22:05 |
QRADAR- | CERT PREP FOR TECHNICAL SALES FOUNDATIONS FOR IBM QRADAR FOR CLOUD (QROC) V1 | - | 2024-08-14 21:48 |
NIST Internal Report NIST IR 8504- | Access Control on NoSQL Databases | - | 2024-08-14 21:34 |
NIST 800-1r1- | Trustworthy Email | - | 2024-08-14 21:23 |
Overview of Amazon Web Services - | AWS Whitepaper | (FREE) | 2024-08-14 20:57 |
Security Orchestration and Automation Playbook- | Your practical guide to implementing a SOAR solution | (FREE) | 2024-08-14 20:52 |
Subdomain Enumeration- | Techniques and tools for discovering and enumerating subdomains of a domain. | - | 2024-08-14 20:48 |
Cyber Security Audit- | Cyber Security Audit Guide | - | 2024-08-13 09:03 |
GRC, SOC, Pentest interview questions- | GRC, SOC analyst and Penetration testing Interview Questions and Answers | - | 2024-08-12 13:21 |
Risk Management, Security Compliance and Audit Control- | Risk Management, Security Compliance and Audit Controls | - | 2024-08-12 13:06 |
Security Controls- | Security+ Study Guide | - | 2024-08-12 13:01 |
Network security policy- | Network security policy template | - | 2024-08-12 12:55 |
K8s observability- | A Holistic Approach to Securing Containers and Cloud Native Applications | - | 2024-08-12 12:50 |
Terraform with AWS- | A comprehensive guide on using Terraform to manage and deploy AWS infrastructure efficiently. | - | 2024-08-12 07:09 |
Network Security Checklist - | A checklist for ensuring network security and mitigating potential threats. | - | 2024-08-07 21:12 |
webGPUattacks - | Generic and Automated Drive-by GPU Cache Attacks from the Browser | - | 2024-08-07 08:46 |
Ultimate Infosec RACI Matrix- | Ultimate Infosec RACI Matrix for Information Security | - | 2024-08-07 08:39 |
Exam SC-200- | Microsoft Security Operations Analyst – Skills Measured | - | 2024-08-07 08:34 |
Cybersecurity Incident Root Cause Analysis- | CYBER SECURITY INCIDENT ROOT CAUSE ANALYSIS EXAMPLE WITH SCENARIO | - | 2024-08-07 08:29 |
RFI & LFI Explained - | Remote and Local File Inclusion Explained | - | 2024-08-07 08:25 |
NIST CSF 2.0 Resources and overview guide - | NIST Cybersecurity Framework (CSF) 2.0 helps organizations manage and reduce their cybersecurity risks | - | 2024-08-07 08:21 |
GSMA - Fraud Typologies - March 2024- | Mobile money fraud typologies and mitigation strategies | - | 2024-08-07 08:18 |
NIST SP 800-66 Rev. 2 - | Implementing the Health Insurance Portability and Accountability Act (HIPAA) Security Rule | - | 2024-08-07 08:08 |
MITRE ATTACKS DETECTION RULES- | The MITRE ATT&CK Alerts For log point | - | 2024-08-07 07:54 |
Recon Notes - | The process of gathering information and intelligence about a target or environment. | - | 2024-08-03 06:38 |
ccna-dumps- | A comprehensive collection of practice questions and answers for CCNA exam preparation. | - | 2024-08-03 06:19 |
A Detailed Guide on Wfuzz - | A guide for pentester | - | 2024-08-01 14:10 |
Guidelines on Cyber Security Specifications- | Guidelines on Cyber Security Specifications (ICT Procurement for Public Service Bodies) | - | 2024-08-01 14:02 |
Taking Kubernetes from Test to Production- | Improving Resilience, Visibility, and Security with Traffic Management Tools | - | 2024-08-01 13:56 |
Direct To Consumer Guide- | The Direct- to-Consumer Guide | (FREE) | 2024-08-01 13:45 |
Implementation Guide ISO_IEC 27001_2022- | A guide for implementing ISO/IEC 27001:2022 standards for information security management systems. | - | 2024-08-01 13:37 |
Active Directory Pentesting Tools- | Essential tools for penetration testing in Active Directory environments. | - | 2024-08-01 12:17 |
Active Directory Attributes- | Important Active Directory Attribute (some useful attributes for red/blue teamer) | - | 2024-08-01 12:09 |
IR-Guidebooks- | Guidance for Incident Responders | - | 2024-08-01 12:06 |
IP Command Cheat Sheets- | ip COMMAND CHEAT SHEET for Red Hat Enterprise Linux | - | 2024-08-01 12:03 |
Multiple Ways to Install Kali- | Multiple methods to setup kali Linux | - | 2024-07-30 14:30 |
Go Lang - Web Application Secure Coding Practices- | Web application secure coding practices | - | 2024-07-29 21:53 |
ISO 27001 checklist- | Use this checklist to assess your ISO 27001 audit readiness and implementation status. | - | 2024-07-29 10:03 |
CompTIA CASP+ Guide- | "" | - | 2024-07-27 10:02 |
Password Reset Vulnerabilities - | "" | - | 2024-07-27 09:53 |
pulumi stack reference lab- | A practical lab for understanding and using Pulumi stack references in infrastructure as code. | - | 2024-07-27 09:51 |
Networking Notes - | "" | - | 2024-07-27 07:51 |
MSF Guide- | A comprehensive guide to using Metasploit Framework (MSF) for penetration testing. | - | 2024-07-27 07:38 |
GDPR for Third-party Risk Management- | Everything you need to know to stay compliant | - | 2024-07-27 07:22 |
File Upload Vulnerabilities- | "" | - | 2024-07-27 07:15 |
Elastic Cloud Compute- | "" | - | 2024-07-27 07:05 |
Command & Control Cheat Sheet- | " Command and Control abbreviated as ""C2"" or ""C&C"", is a tactic in Mitre ATT&CK framework that consists of various techniques" | - | 2024-07-27 06:53 |
A Detailed Guide on RustScan- | "" | - | 2024-07-26 12:00 |
A Detailed Guide on Pwncat- | "" | - | 2024-07-26 11:55 |
Advance DevOps Interview- | This module, An Advanced DevOps Interview focuses on assessing a candidate's expertise in integrating development and operations processes, tools and best practices to streamline and automate software delivery. | - | 2024-07-25 18:57 |
Pipelines for different deployment - | Different CI/CD Pipelines For Different Deployment Stratgies | - | 2024-07-24 22:55 |
Passive Api Recon- | This explores passive API reconnaissance (recon), a crucial step in the security assessment and penetration testing process. It covers various techniques for gathering information about APIs without directly interacting with them, | - | 2024-07-24 20:13 |
Remcos- | This delves into Remcos, a remote control and surveillance software that allows users to manage and monitor systems remotely. It covers the key features, common uses, security implications, and best practices for using Remcos responsibly. | - | 2024-07-24 15:10 |
Python- | This explores Python, a high-level, interpreted programming language known for its simplicity and versatility. It covers Python's key features, its applications across various domains, and provides resources for learning and mastering the language. | - | 2024-07-24 13:57 |
Attacking Kubernetes- | Kubernetes, an online containerization technique can be exploited so as safeguarded. This module gives all you need to know from techniques to the requisite tools in other to exploit vulnerable containers. | - | 2024-07-23 16:29 |
Ansible- | This article explores Ansible, a powerful automation tool used for configuration management, application deployment, and task automation. It provides an in-depth look at Ansible's architecture, key features, and practical applications in IT environments. | - | 2024-07-23 15:03 |
DevOps for Networking- | Devops for networking | - | 2024-07-22 21:02 |
100 Offensive Security Tools- | Offensive security tools are designed for testing and assessing the security of systems, networks, and applications by simulating attacks. These tools are used by ethical hackers and security professionals to detect vulnerabilities before malicious attack | (FREE) | 2024-07-20 23:00 |
100 Free Security Tools For Ethical Hackers and Forensic Investigators- | This content will expose you to penetration testing tools, bug bounty tools, forensic and information gathering tools for real life problems. | - | 2024-07-20 22:23 |
Mail Server Attacks Cheat Sheet - | "" | - | 2024-07-20 20:29 |
Kubernetes networking (IBM)- | "" | - | 2024-07-20 20:26 |
Kubernetes Ingress- | "" | - | 2024-07-20 20:21 |
Kubernetes - Best Practices- | "" | - | 2024-07-20 20:17 |
Kubernetes - | Security Cheat Sheet | - | 2024-07-20 20:08 |
John The Ripper - A Pentester Guide- | "" | - | 2024-07-20 19:57 |
Jenkins Penetration Testing- | "" | - | 2024-07-20 17:41 |
ISC2 Questions & Answers - | "" | - | 2024-07-20 09:48 |
60 Methods for Cloud Attacks- | This content exposes you to techniques such as phishing attacks, data breaches, insider threats, malware injections, cloud api attacks, cloud api key theft and many others. | - | 2024-07-19 11:10 |
Burpsuite Notes For Beginners- | Burp suites note for beginners | - | 2024-07-18 23:35 |
CompTIA Security Plus Study Notes- | Security concepts and study notes | - | 2024-07-18 22:12 |
How To Perform A Vulnerability Assessment- | "" | - | 2024-07-17 20:37 |
AEM Misconfiguration Cheat Sheet - | "" | - | 2024-07-17 20:33 |
Disk Group Privilege Escalation- | "" | - | 2024-07-17 20:30 |
DISASTER RECOVERY PLAN – TEMPLATE- | "" | - | 2024-07-17 20:26 |
DevSecOps Security Architecture- | "" | - | 2024-07-17 20:24 |
Devops Modern practice - | Devops for the Modern enterprise | - | 2024-07-17 20:20 |
Deep Dive Into Antivirus Configuration in FortiGate- | "" | - | 2024-07-17 19:07 |
LATEST SOC ANALYST L1 INTERVIEW QUESTIONS (SCENARIO AND EXAMPLE)- | "" | - | 2024-07-17 18:56 |
Comprehensive Guide on Ncrack – A Brute Forcing Tool- | "" | - | 2024-07-17 18:54 |
A Simple Code Pipeline - | "" | - | 2024-07-17 18:50 |
Advance Json tests CheatSheet - | 97 JSON Tests for for Authentication Endpoints | - | 2024-07-17 18:44 |
Shodan Dorking - | "" | - | 2024-07-13 22:15 |
SQA INTERVIEW Q-A- | questions and answers for Software Quality Assurance (SQA) interviews. | - | 2024-07-13 22:12 |
GitHub Dorks - | "" | - | 2024-07-13 22:09 |
Dynamic Malware Analysis Guide - | "" | - | 2024-07-13 22:08 |
Vulnerability Scan - | Nmap for Pentester | - | 2024-07-13 22:04 |
The Purple Book on Cyber Security - | "" | (FREE) | 2024-07-13 22:01 |
CySA Notes - | Notes and study materials for the CompTIA Cybersecurity Analyst (CySA+) certification. | - | 2024-07-13 21:57 |
Cyber Incident Response - | "" | - | 2024-07-13 21:49 |
Comprehensive Guide on Honeypots-2- | "" | - | 2024-07-13 21:46 |
Command Injection Guide - | "" | - | 2024-07-13 21:39 |
CIS Critical Security Controls® Version 8.1- | "" | - | 2024-07-13 21:34 |
CISSP Study Notes from CISSP Prep Guide- | "" | - | 2024-07-13 21:18 |
Cloud DevOps- | Maven Best Practices | - | 2024-07-11 14:38 |
cloud security- | cloud | - | 2024-07-11 12:23 |
ISMS handbook- | ISO 27001:2022 HANDBOOK INFORMATION SECURITY MANAGEMENT | - | 2024-07-09 22:25 |
CEHv12 Exam Set Practice Questions- | Practice questions for the Certified Ethical Hacker version 12 (CEHv12) exam preparation. | - | 2024-07-09 22:14 |
AWS - Command Line Interface- | "" | - | 2024-07-09 22:10 |
Blue Team Tools - | This article contains a collection of 65+ tools and resources that can be useful for blue teaming activities. | - | 2024-07-09 21:59 |
Attacking Golang- | "" | - | 2024-07-09 21:48 |
Ansible- | An open-source automation tool for software provisioning, configuration management, and application deployment. | (FREE) | 2024-07-09 21:40 |
200 Git Q&A- | "" | - | 2024-07-09 21:23 |
Admin Panel Bypass Checklist - | "" | - | 2024-07-09 21:21 |
A GUIDE TO BORDER GATEWAY PROTOCOL (BGP) BEST PRACTICES- | "" | - | 2024-07-09 21:18 |
CCNA Dumps- | Study materials and practice exams for the Cisco Certified Network Associate (CCNA) certification. | - | 2024-07-09 21:10 |
Terraform Modules QA- | "" | - | 2024-07-05 16:44 |
Terraform Important Question with Answers- | "" | - | 2024-07-05 16:42 |
SOC Interview Questions and Answers- | "" | - | 2024-07-05 16:39 |
SOC fundamentals- | "" | (FREE) | 2024-07-05 16:34 |
API Security Testing Guide - | "" | - | 2024-07-05 16:28 |
Shell scripting - | "" | - | 2024-07-05 10:38 |
Security of personal data- | "" | - | 2024-07-05 08:33 |
Sample Penetration Test Report- | "" | - | 2024-07-05 08:13 |
Bash - | Notes for Professionals | - | 2024-07-05 07:59 |
CISM Study Notes Part 2 - | "" | - | 2024-06-29 16:59 |
CISM Study Notes Part 1 - | "" | - | 2024-06-29 16:53 |
CISM Study Guide Part 4- | "" | - | 2024-06-29 16:40 |
CISM Short Study Guide Part 3-4- | "" | - | 2024-06-29 16:36 |
wireshark notes part 2- | "" | - | 2024-06-29 16:31 |
Attacking APIs- | With secure coding practice in dotnet and Java | - | 2024-06-26 09:26 |
Threat Hunting 101- | 8 Threat Hunts You Can Do with Available Resources | - | 2024-06-26 08:28 |
The Good Parts of AWS- | This is not your typical reference book. It doesn’t cover all of AWS or all its quirks. Instead, we want to help you realize which AWS features you’d be enjoy using. | - | 2024-06-26 08:12 |
AWS (SAA-C02): Practice Test 1- | "" | (FREE) | 2024-06-24 14:12 |
AWS Certified Solutions Architect Associate - | Are you Ready for the AWS Certified Solutions Architect Associate exam? | - | 2024-06-24 13:45 |
Attacks On TCP- | "" | - | 2024-06-24 13:29 |
Attacking Rust- | Modern System Application Vulnerabilities Comprehensive Analysis | - | 2024-06-24 13:12 |
Attacking PHP Applications - | A guide on identifying and exploiting vulnerabilities in PHP applications, covering common attack vectors, techniques, and methods for securing PHP-based systems. | - | 2024-06-24 12:57 |
Attacking Java- | Modern web Application Vulnerabilities Analysis | - | 2024-06-23 17:06 |
Attacking AWS- | Offensive Security Approach | - | 2024-06-23 16:49 |
Firefox Addons for Pentesting- | This explores a range of Firefox add-ons that are invaluable for penetration testers. It provides an overview of each tool, explaining its functionality and how it can be leveraged during various stages of a penetration test. | - | 2024-06-21 16:31 |
The Ultimate Xss Protection CheatSheet For Developers- | The quick guide for developers to protect their web applications from XSS. | - | 2024-06-19 13:09 |
IOT Test Automation Framework (ITAF) Walkthrough - | IOT Test Automation Framework (ITAF) WALKTHROUGH Revision 1.0 | - | 2024-06-19 12:28 |
Introduction to Purple Teaming - | "" | - | 2024-06-19 12:19 |
Introduction to Cybersecurity- | "" | (FREE) | 2024-06-19 12:04 |
Introduction To API- | "" | - | 2024-06-19 11:30 |
ICS2 CISSP Exam Practice Questions- | "" | (FREE) | 2024-06-19 11:23 |
Hacker Methodologies & Tools Notes - | The Top Hacker Methodologies & Tools Notes | - | 2024-06-19 10:45 |
Docker Penetration Testing- | "" | - | 2024-06-19 10:43 |
Digital-Forensics-and-Incident-Response(DFIR)Framework- | Digital Forensics and Incident Response (DFIR) Framework for Operational Technology (OT) | - | 2024-06-19 10:34 |
Information Security Handbook for Network Beginners - | "" | (FREE) | 2024-06-19 10:02 |
Web Application Penetration Testing - | A comprehensive guide on methodologies, tools, and techniques for conducting penetration tests on web applications to identify and exploit vulnerabilities, ensuring robust security measures. | - | 2024-06-15 14:04 |
Top 50 Cybersecurity Interview Questions with Answer- | "" | (FREE) | 2024-06-15 13:39 |
The HITRUST Approach to NIST CSF 2.0- | An overview of how HITRUST aligns with NIST Cybersecurity Framework (CSF) 2.0, offering a structured method for enhancing cybersecurity risk management and compliance. | - | 2024-06-15 13:35 |
The Open Source Cybersecurity Playbook - | "" | - | 2024-06-15 13:24 |
Shodan Guide - | Complete Guide to Shodan | - | 2024-06-15 13:20 |
OWASP Secure Code Review - | Code review guide | (FREE) | 2024-06-15 13:09 |
SMB Relay Attacks and How to Prevent Them- | An guide on SMB relay attacks, explaining how these attacks exploit the Server Message Block (SMB) protocol, and providing effective prevention techniques to safeguard network communications. | - | 2024-06-15 12:15 |
Email Header Analysis - | "" | - | 2024-06-15 12:05 |
Dockerfile_ A key Component in Containerization - | Understanding Dockerfile: A Key Component in Containerization | - | 2024-06-15 11:52 |
Decoding Shell Vulnerability - | "" | - | 2024-06-15 11:45 |
PCI DSS - ISO 27001 Mapping- | This article provides a detailed mapping between the Payment Card Industry Data Security Standard (PCI DSS) and the ISO/IEC 27001 standard. | - | 2024-06-14 18:13 |
Scenario-Based & Incident Report Analysis - | CYBERSECURITY ANALYST INTERVIEW QUESTIONS (SCENARIO- BASED & INCIDENT REPORT ANALYSIS) | - | 2024-06-14 17:39 |
Port Security Configuration- | - | 2024-06-14 16:43 | |
40 METHODS FOR PRIVILEGE- | This topic covers techniques and methodologies used to gain elevated access on Linux systems. It includes exploiting vulnerabilities, misconfigurations, and leveraging user permissions to achieve root or administrative privileges. | - | 2024-06-14 06:18 |
Cross Site Request Forgery- | This article provides an in-depth look at Cross-Site Request Forgery (CSRF), a prevalent web security vulnerability. It explains the mechanics of CSRF attacks, their potential impact on web applications, and effective strategies for mitigation. | - | 2024-06-13 14:25 |
Basics of Splunk - | This article provides a comprehensive introduction to Splunk, a powerful platform for searching, monitoring, and analyzing machine-generated data. | - | 2024-06-13 13:15 |
S3 Bucket - Creating and Naming Buckets- | Amazon S3 (Simple Storage Service) provides scalable, high-speed, web-based cloud storage designed to store and retrieve any amount of data from anywhere. It is widely used for backup, archiving, data lakes, and content distribution. | - | 2024-06-12 21:36 |
2FA SECURITY Issues - | This article delves into the security issues associated with Two-Factor Authentication (2FA), examining common vulnerabilities, potential threats, and effective mitigation strategies. | - | 2024-06-12 14:25 |
37 Essential tools for Active Directory Penetration Testing- | This guide covers 37 essential tools that are invaluable for conducting penetration testing. It is aimed at cybersecurity professionals, ethical hackers, and IT administrators who seek to assess and enhance the security of their Active Directory setups. | - | 2024-06-12 12:17 |
Shell Scripting- | UNIX Shell Scripting Focus Training Services | (FREE) | 2024-06-10 13:28 |
siem extraordinary soc use cases - | A guide detailing exceptional use cases of Security Information and Event Management (SIEM) in Security Operations Centers (SOCs), showcasing how SIEM solutions enhance threat detection, incident response, and overall cybersecurity management. | - | 2024-06-10 13:22 |
SOC Analyst Interview Questions- | "" | - | 2024-06-10 13:19 |
SQL Injection Attacks & Defense- | A comprehensive guide on SQL injection attacks, including techniques used by attackers, examples of vulnerabilities, and strategies for defending against SQL injection to secure database-driven applications. | - | 2024-06-10 13:17 |
SSRF Vulnerability Guide - | "" | - | 2024-06-10 13:11 |
The Art of Privilege Escalation - Windows & Linux - | "" | - | 2024-06-10 13:07 |
The Linux Command Handbook by Flavio Copes- | "" | - | 2024-06-10 12:57 |
Tomcat Penetration Testing- | A guide on performing penetration testing on Apache Tomcat servers, including techniques for identifying vulnerabilities, exploiting weaknesses, and securing Tomcat installations. | - | 2024-06-10 12:22 |
WebFiltering in FortiGate - | A detailed guide on configuring and managing web filtering in FortiGate | - | 2024-06-10 12:04 |
The Ultimate Guide to Building Technical Teams- | "" | - | 2024-06-10 11:45 |
Google Hacking for penetrations tester - | This guide explores advanced search techniques used by penetration testers to uncover vulnerabilities and sensitive information on the internet using Google. It provides practical examples and strategies for ethical hacking and cybersecurity professionals | - | 2024-06-07 17:06 |
RabbitMQ vs Kafka vs ActiveMQ- | "" | - | 2024-06-05 12:02 |
GitHub Dorks Cheatsheet by Anton- | "" | - | 2024-06-05 11:59 |
XXE Injection- | An informative guide on XML External Entity (XXE) Injection attacks, including how they work, their potential impact, and strategies for detecting and preventing these vulnerabilities in web applications. | - | 2024-06-05 11:52 |
Wireshark for Security Professionals- | "" | (FREE) | 2024-06-05 11:38 |
Windows AD Exploitation Cheat Sheet - | Windows & Active Directory Exploitation Cheat Sheet and Command Reference | - | 2024-06-05 11:20 |
Windows 11 Security Book- | "" | - | 2024-06-05 11:12 |
Web Security Testing Guide- | A comprehensive manual for testing web application security, covering various techniques and methodologies to identify vulnerabilities. Includes practical steps for performing security assessments and ensuring robust protection against cyber threats. | - | 2024-06-05 10:26 |
Suspicious Traffic Detection- | Suspicious Traffic Detection | - | 2024-06-05 10:09 |
System Design Golden Rules- | Golden Rules to answer in a System Design Interview | (FREE) | 2024-06-05 09:58 |
Thick Client Pentesting Checklist - | THICK CLIENT PENTESTING CHECKLIST | - | 2024-06-05 09:52 |
XSS REGEX BYPASS - | "" | - | 2024-05-26 13:52 |
Splunk Use Cases - | Exploring Splunk Use Cases | - | 2024-05-26 13:24 |
splunk complete notes- | "" | - | 2024-05-26 13:15 |
SPLUNK® AND THE CIS CRITICAL SECURITY CONTROLS- | Mapping Splunk Software to the CIS 20 CSC Version 6.0 | - | 2024-05-26 08:38 |
Mastering Splunk- | An Essential Guide | - | 2024-05-26 07:14 |
OSPF vs BGP- | Explore the nuances between OSPF (Open Shortest Path First) and BGP (Border Gateway Protocol) | - | 2024-05-25 19:08 |
Big O Cheat Sheet- | "" | - | 2024-05-25 19:06 |
DevOps Monitoring & Logging Tools- | "" | - | 2024-05-25 19:04 |
Vulnerability Assessment And Penetration Testing- | Ace your VAPT interviews with this comprehensive guide. Covering fundamental concepts and advanced techniques, this resource equips you with the knowledge and confidence to excel. | - | 2024-05-25 19:03 |
Wordlists for Pentester- | "" | - | 2024-05-25 18:52 |
TOP 100 CyberThreats- | "" | - | 2024-05-25 18:42 |
WireShark and traffic analysis- | A comprehensive guide on using Wireshark for network traffic analysis. Covers installation, configuration, and practical techniques for monitoring, capturing, and analyzing network traffic to identify and troubleshoot issues. | - | 2024-05-25 18:39 |
Advanced MySQL Exploitation - | This article explores advanced techniques for exploiting vulnerabilities in MySQL databases, offering a deep dive into methods used by attackers and providing comprehensive strategies for defense. | - | 2024-05-24 01:02 |
TLS certificate using Let's Encrypt- | This guide provides a comprehensive walkthrough on how to obtain, install, and manage TLS certificates using Let's Encrypt, a free and open certificate authority. | - | 2024-05-24 00:27 |
TCP and UDP- | This article provides a detailed exploration of Transmission Control Protocol (TCP) and User Datagram Protocol (UDP), two core components of the internet protocol suite. | - | 2024-05-23 23:46 |
Broken Link Hijacking Vulnerability Guide - | This comprehensive guide explores the concept of Broken Link Hijacking, a security vulnerability that can occur when abandoned web links are taken over by malicious actors. | - | 2024-05-23 23:16 |
AWS – MYSQL RDS Creation Steps- | "" | (FREE) | 2024-05-22 09:10 |
Azure Sentinel KQL Queries- | "Top 300 Azure Sentinel KQL Queries for Security Operations"" is a comprehensive collection of Kusto Query Language (KQL) queries specifically curated for Azure Sentinel users, security analysts, and SOC teams." | - | 2024-05-21 19:14 |
How to bypass Firewall- | This article provides an in-depth exploration of techniques used to bypass firewalls, aimed at cybersecurity professionals, penetration testers, and IT security enthusiasts. | - | 2024-05-18 22:17 |
Ansible CICD- | This article provides a detailed guide on implementing Continuous Integration and Continuous Deployment (CI/CD) using Ansible. It covers the fundamentals of Ansible and practical steps to set up and manage these pipelines effectively. | - | 2024-05-18 13:18 |
Python MCQ with Answers- | This article is designed for students, beginners, and professionals preparing for exams, interviews, or seeking to test their Python programming knowledge. | - | 2024-05-17 20:31 |
DevOps Interviews- | "The ""Demystifying DevOps"" guide is a comprehensive resource that dives deep into the world of DevOps, covering essential concepts, principles, tools, and best practices for modern software development and deployment." | - | 2024-05-16 21:44 |
Release Notes- | Release Notes | - | 2024-05-16 16:40 |
Turbo Intruder- | This comprehensive guide provides a deep dive into bug bounty programs, offering insights into the world of ethical hacking, responsible disclosure, and cybersecurity rewards. | - | 2024-05-14 20:25 |
TOP 100 Vulnerabilities Step-by-Step Guide- | This is a comprehensive resource designed to help cybersecurity professionals, system administrators, and IT teams understand and mitigate the most critical vulnerabilities affecting modern systems and networks. | - | 2024-05-11 21:58 |
Pwning the Domain. Kerberos Delegation- | This guide dives deep into the realm of Kerberos delegation, exploring advanced techniques and strategies for effectively exploiting and leveraging Kerberos delegation in Windows Active Directory environments. | - | 2024-05-11 16:52 |
Cybersecurity Terms- | "The article ""Understanding Cybersecurity Terms"" serves as a comprehensive guide to essential cybersecurity terminology, providing readers with a clear understanding of key concepts and terms used in the cybersecurity domain. " | (FREE) | 2024-05-07 22:08 |
Hacking Practical Guide - | This a comprehensive resource designed to provide hands-on techniques, tools, and methodologies for ethical hackers, cybersecurity professionals, and security enthusiasts looking to deepen their understanding of hacking practices in an ethical manner. | - | 2024-05-06 22:07 |
Computer Network Basic Notes for Beginners - | These computer networking basics notes serve as a foundational resource for beginners looking to understand the fundamentals of computer networks, networking protocols, and communication technologies. | (FREE) | 2024-05-04 19:09 |
Terraform Interview Q&A- | The article guide is designed to help DevOps engineers and professionals prepare for interviews focused on Terraform, an infrastructure as code (IaC) tool used for automating cloud infrastructure provisioning and management. | - | 2024-05-04 14:44 |
Computer Hacking Beginners Guide Book's- | "The ""Beginner's Guide to Computer Hacking"" book is an introductory resource tailored for individuals interested in learning cybersecurity basics and ethical hacking techniques from scratch." | - | 2024-04-28 15:18 |
Certified Ethical Hacker - Exam Preparation- | "The ""Certified Ethical Hacker (CEH) Exam Preparation Guide"" is a comprehensive resource designed to assist aspiring cybersecurity professionals in preparing for the CEH certification exam." | (FREE) | 2024-04-28 11:55 |
MS_Top6MicroservicesPatterns_V12_0- | "The article ""Exploring the Top 6 Microservices Patterns for Modern Application Architecture"" provides an in-depth analysis of six fundamental microservices patterns essential for designing scalable, resilient, and agile software systems." | (FREE) | 2024-04-27 13:57 |
Wireless Penetration Testing with Airgeddon- | "The article ""Wireless Penetration Testing with Airgeddon"" provides a comprehensive guide to conducting wireless penetration testing using the Airgeddon toolkit." | - | 2024-04-27 12:03 |
Bypasses For The Most Popular WAF- | "The article ""Bypass Techniques for Leading Web Application Firewalls (WAFs)"" explores advanced strategies and methodologies for bypassing the most popular Web Application Firewalls (WAFs). " | (FREE) | 2024-04-25 21:37 |
Web LLM Attacks- | "The article ""Large Language Models"" provides a comprehensive overview of the advancements, applications, challenges, and ethical considerations surrounding large language models (LLMs)." | (FREE) | 2024-04-25 19:14 |
Firewall Audit Checklist- | "" | - | 2024-04-25 14:35 |
100-Jenkins-Errors-By-DevOpsShack- | "" | - | 2024-04-25 14:17 |
Malware Analysis- | Guide to Performing Malware Analysis in Content Analysis 2.3 | - | 2024-04-25 14:01 |
NSA-Network Infrastructure Security Guide- | The NSA Network Infrastructure Security Guide provides comprehensive guidance on securing network infrastructure against cyber threats, covering best practices, recommendations, and mitigation strategies to enhance network security posture. | - | 2024-04-25 13:50 |
Kubernetes Interview Questions v2- | 225 Realtime Hands on kubernetes Top Interview Questions and Answers Using ChatGPT | (FREE) | 2024-04-25 13:46 |
Disaster Recovery plan Template - | "" | - | 2024-04-25 13:42 |
The ISO 27001 Gap Analysis Template- | The ISO 27001 Gap Analysis Template is a comprehensive tool designed to help organizations assess their current state of compliance with the ISO/IEC 27001 standard for information security management systems (ISMS). | - | 2024-04-24 16:25 |
How to respond to a ransomware attack in 12 steps- | "The article ""How to Respond to a Ransomware Attack in 12 Steps"" offers a detailed and structured approach to dealing with ransomware incidents effectively." | - | 2024-04-23 23:25 |
Cyber security in supplier relationships- | Protect your organization when outsourcing IT operations in the entire process – from start to finish. | - | 2024-04-23 22:47 |
Azure DevOps- | This comprehensive guide delves into the key components of Azure DevOps, its features, capabilities, and benefits for teams and organizations involved in software development and delivery. | (FREE) | 2024-04-23 22:45 |
Active Directory Security Bypass- | The Complete Active Directory Security Handbook Exploitation, Detection, and Mitigation Strategies | - | 2024-04-23 22:31 |
Account Takeover- | ACCOUNT TAKEOVER IN 2022 THE 24-BILLION PASSWORD PROBLEM | - | 2024-04-23 21:56 |
AWS ROUTE 53 FULL GUIDE- | A comprehensive guide on route 53 | (FREE) | 2024-04-23 21:46 |
100 Cyber Security Questions- | "The article ""100 Cyber Security Questions"" is an extensive guide that covers a wide range of cybersecurity topics, providing readers with a thorough understanding of essential concepts, principles, and best practices in the field of cybersecurity. " | - | 2024-04-23 19:32 |
Hacking Made Simple by Python- | """Hacking Made Simple with Python"" is a beginner-friendly guide that introduces readers to the fundamentals of ethical hacking using the Python programming language." | - | 2024-04-23 16:44 |
The NIST Cybersecurity Framework (CSF) 2.0- | "" | (FREE) | 2024-04-20 22:02 |
Top Cyber Security Interview Questions & Answers - | "" | - | 2024-04-20 21:51 |
NIST 800-61r3 Initial Public Draft- | Incident Response Recommendations and Considerations for Cybersecurity Risk Management | - | 2024-04-20 21:48 |
NIST IR 8477 February 2024- | Mapping Relationships Between Documentary Standards, Regulations, Frameworks, and Guidelines | - | 2024-04-20 21:41 |
Cyber Crisis- | Best Practices for Cyber Crisis Management | (FREE) | 2024-04-20 21:34 |
250 Practice Questions For Terraform Associate Certification- | Terraform Associate Certification | - | 2024-04-20 21:27 |
IT Risk Register- | "The ""IT Risk Register"" is a vital tool and framework used by organizations to identify, assess, prioritize, and manage IT-related risks proactively. " | - | 2024-04-20 16:02 |
Attacking Kubernetes- | This is a comprehensive guide that delves into the various security challenges and attack vectors associated with Kubernetes environments. | - | 2024-04-20 13:38 |
FTK Imager- | "A Comprehensive Guide to Digital Forensic Imaging and Analysis"" is an in-depth resource that explores the capabilities, features, and best practices of FTK Imager in the field of digital forensics. " | - | 2024-04-18 21:05 |
AZ-500 Azure Security Engineer- | Microsoft AZ-500 Azure Security Engineer Associate Quick Reference Guide | - | 2024-04-18 11:41 |
Microsoft 365 Security Checklist - | Security Checklist | - | 2024-04-18 11:25 |
CEH: 255 Questions- | Certified Ethical Hacker, EC-Council 255 Questions | (FREE) | 2024-04-18 11:17 |
Hacking with Python- | "" | (FREE) | 2024-04-14 14:23 |
ISO 27001 _ 2022 Scoping Guide- | "" | - | 2024-04-14 12:17 |
IT Disaster Recovery Plan - | IT Disaster Recovery Plan Template | (FREE) | 2024-04-14 12:09 |
Secure data in cloud- | Learn how to secure data in the cloud with best practices and strategies for data encryption, access control, secure storage, and data loss prevention to protect sensitive information in cloud environments. | - | 2024-04-14 12:03 |
WIRESHARK CHEAT SHEET- | "" | (FREE) | 2024-04-14 12:00 |
Linux for Beginners- | The Ultimate Guide To The Linux Operating System & Linux Commands 1st Edition | (FREE) | 2024-04-14 11:50 |
IP: Ping - Basic Network Troubleshooting- | Need To Know Basis Ping By Jorgen Lanesskog | - | 2024-04-14 11:44 |
Canonical Guide_ Apache Kafka on Kubernet3s- | 7 approaches to accelerating Apache Kafka on K8s | (FREE) | 2024-04-14 11:38 |
AWS Interview guide- | by simplilearn | - | 2024-04-14 11:35 |
OWASP API Security Checklist for 2023- | "" | (FREE) | 2024-04-14 11:29 |
Openshift- | " Comprehensive Overview of Kubernetes Platform"" is an in-depth guide that explores OpenShift, a leading container platform based on Kubernetes, designed for building, deploying, and managing containerized applications at scale. " | - | 2024-04-14 11:29 |
Deep and Dark Web Guide- | This is a comprehensive resource that provides insights, tips, and best practices for navigating the hidden corners of the internet known as the deep web and dark web. | (FREE) | 2024-04-13 17:41 |
Firewall Rules- | This guide is a comprehensive resource that delves into the principles, techniques and best practices for designing and implementing effective firewall rules. | - | 2024-04-12 21:35 |
Nmap Cheat Sheet- | A handy cheat sheet for using Nmap, a powerful network scanning tool, providing quick reference for essential commands and options to perform efficient network exploration and security audits. | - | 2024-04-12 10:05 |
Kubernetes Security Guide- | "" | - | 2024-04-12 09:43 |
ISO27005_2022- | International standard providing guidelines for information security risk management, offering a systematic approach to identifying, assessing, and mitigating information security risks within organizations. | - | 2024-04-10 22:26 |
Docker Security- | A comprehensive overview of Docker security practices | - | 2024-04-10 22:22 |
Advancing Zero Trust Maturity Throughout the Data Pillar- | A strategic approach to advancing Zero Trust maturity within the Data Pillar, emphasizing data-centric security measures and best practices to mitigate cyber threats and enhance overall security posture. | - | 2024-04-10 22:18 |
100 K8 Errors & Solution By DevOps Shack- | An extensive compilation of 100 common errors encountered in Kubernetes (K8) environments, along with detailed solutions and troubleshooting tips provided by DevOps Shack, aimed at assisting users in resolving issues efficiently. | - | 2024-04-10 22:10 |
90 Must-Know tech Concepts for your next interview- | A curated list of 90 essential technology concepts covering a wide range of topics commonly encountered in technical interviews, designed to help candidates prepare effectively for their next interview. | (FREE) | 2024-04-10 22:07 |
Docker Security Cheat Sheet- | This is a comprehensive guide that provides best practices, tips, and techniques for securing Docker containers and environments effectively. | - | 2024-04-10 17:48 |
Logrythm- | This is a comprehensive overview of a SIEM Solution that explores LogRhythm, a leading security information and event managemnet (SIEM) solution designed to help organizations detect, respond to and mitigate cyersecurity threats efectively | - | 2024-04-10 15:13 |
ISO 27001 Scope Document Template- | "" | - | 2024-04-08 13:52 |
Top 50 DevOps Amazing Questions- | "" | (FREE) | 2024-04-08 13:46 |
How SPF, DKIM, and DMARK work- | How SPF, DKIM, and DMARK work in your Email Flow | - | 2024-04-08 13:42 |
nmap with wireshark- | This is a comprehensive guide that explores the synergistic use of Nmap and Wireshark for network reconnaissance, mapping, and deep packet analysis. | (FREE) | 2024-04-06 21:18 |
XXE- | This s an informative article that explores the risks posed by XML External Entity (XXE) vulnerabilities, along with effective detection and prevention strategies. | - | 2024-04-06 20:02 |
User troubleshooting in Kubernetes commands- | This is a comprehensive guide that provides valuable insights and strategies for diagnosing and resolving issues encountered while working with Kubernetes commands. | - | 2024-04-05 16:27 |
DNS Security Guide- | A comprehensive guide covering best practices, tools, and techniques for enhancing the security of Domain Name System (DNS) infrastructure. | - | 2024-04-04 21:48 |
Multistage Dockerfile- | "" | - | 2024-04-04 21:41 |
nessus basics notes- | Nessus vulnerability scanner | - | 2024-04-04 21:38 |
NIST DevSecOps strategy- | Strategies for the Integration of Software Supply Chain Security in DevSecOps CI/CD Pipelines | (FREE) | 2024-04-04 21:31 |
Terraform interview questions- | Here's a list of the top 20 Terraform interview questions and answers for fresher-level positions | (FREE) | 2024-04-04 21:27 |
Wireless Pentesting- | """Wireless Penetration Testing"" is a comprehensive guide that explores the intricacies of assessing and securing wireless networks through penetration testing. " | - | 2024-04-03 19:50 |
Wireless Penetration Testing- | This is a comprehensive guide that delves into the intricacies of assessing and securing wireless networks through penetration testing. | - | 2024-04-03 18:40 |
Detailed Guide In SNIFFING - | An extensive guide covering various aspects of network sniffing techniques, tools, and best practices. | - | 2024-04-03 17:07 |
Cyber Security Roadmap - | MASTERING CYBERSECURITY WITH EDUREKA | (FREE) | 2024-04-03 16:39 |
Ansible Study Guide- | Expertise in Ansible Automation | - | 2024-04-03 16:34 |
COMPTIA Security Plus Master Cheat Sheet- | A comprehensive cheat sheet covering key concepts and topics relevant to the CompTIA Security+ certification exam. | - | 2024-04-03 16:31 |
Autopsy Kali and windows - | Learn how to utilize Autopsy, a digital forensics platform, for analyzing Windows systems, in conjunction with Kali Linux. | - | 2024-04-03 16:27 |
MSSQL for Pentesters - Metasploit- | This is a comprehensive guide that explores the techniques, tools, and methodologies for conducting penetration testing and database exploitation on Microsoft SQL Server (MSSQL) using the Metasploit framework. | - | 2024-04-01 18:18 |
LPE - Exploitation- | This is an insightful and comprehensive article that delves into the various techniques, vulnerabilities, and mitigation strategies related to privilege escalation in Linux systems | - | 2024-04-01 15:55 |
Cyber incident playbook - | A practical guide with predefined steps for responding to cyber incidents, facilitating effective incident response to minimize impact on operations. | - | 2024-04-01 13:35 |
Incident Response Reference Guide- | A comprehensive reference guide providing essential information, procedures, and best practices for handling cybersecurity incidents effectively, covering incident detection, analysis, containment, eradication, recovery, and post-incident lessons learned. | - | 2024-04-01 13:33 |
Deploying MQ and Tomcat on Kubernetes- | A step-by-step guide to deploying IBM MQ (Message Queue) and Apache Tomcat applications on Kubernetes clusters, covering configuration, deployment. | - | 2024-04-01 13:25 |
Ransomware Incident Response Plan- | A comprehensive guide outlining strategies and procedures to effectively respond to ransomware attacks, including detection, containment, recovery, and post-incident analysis, aimed at minimizing the impact and restoring normal operations. | (FREE) | 2024-04-01 13:19 |
Kubescapes For Tenaagers- | This is an engaging and informative article that delves into the world of Kubernetes and its potential applications in youth education. | - | 2024-03-31 15:15 |
Anonymous Login- | Anonymous Logins for Pentester | - | 2024-03-30 12:16 |
Attacking Docker- | This article is an in-depth article that explores the vulnerabilities, risks, and security challenges associated with Docker containers in modern software development and deployment environments. | - | 2024-03-30 11:32 |
[GreenCircle] Security Operations Center- | This is a comprehensive guide that provides a detailed overview of SOC functions, components, and best practices in cybersecurity operations. | - | 2024-03-29 23:32 |
Ansible Usecases- | 20 Real-Time Use-Cases of Ansible With Detailed Examples | - | 2024-03-29 21:56 |
Hydra Guide- | An in-depth exploration of Hydra a versatile and powerful password cracking tool used for performing brute-force and dictionary attacks, examining its features, capabilities, and practical applications in cybersecurity testing and assessment. | - | 2024-03-29 21:05 |
How to set up CSIRT and SOC. Good practice guide- | Good practice guide for establishing and operating a Computer Security Incident Response Team (CSIRT) and Security Operations Center (SOC), providing step-by-step instructions and recommendations for effective incident detection, response, and mitigation. | - | 2024-03-29 17:36 |
ArgoCD for Teenagers [English]- | A beginner-friendly guide to ArgoCD, explaining the basics of continuous delivery and how to use ArgoCD to manage Kubernetes applications, designed for teenagers and beginners. | - | 2024-03-29 17:30 |
Linux 500 Interview Based Questions and Answers - | A comprehensive collection of 500 interview-based questions and detailed answers covering a wide range of Linux topics, designed to help candidates prepare effectively for Linux-related job interviews. | - | 2024-03-29 17:24 |
API TESTING HANDBOOK- | A comprehensive guide that covers essential concepts, strategies, and best practices for testing Application Programming Interfaces (APIs). | - | 2024-03-27 16:08 |
CompTIA Pentest+ (Study Notes)- | Comprehensive study notes covering essential topics and concepts for the CompTIA Pentest+ certification exam, providing concise summaries and key points to aid in exam preparation. | - | 2024-03-26 22:59 |
AWS WAF - Performance Efficiency- | Learn how to leverage AWS WAF (Web Application Firewall) to enhance the performance efficiency of your web applications | (FREE) | 2024-03-26 22:48 |
AWS EC2- | Amazon Elastic Computer Cloud (Amazon EC2) | - | 2024-03-25 22:53 |
Some useful bash scripts - | Useful Bash Scripts: Streamlining Automation and Tasks | - | 2024-03-23 21:39 |
API security best practices- | [MuleSoft] Protect your APIs with Anypoint Platform | - | 2024-03-21 21:48 |
Guidance for developing Supply Chain Security- | Guidance for developing Supply Chain Incident Response and Management within your organisation. | - | 2024-03-21 21:42 |
Password security- | Password guide for IT users, developers, administrators and senior management. | - | 2024-03-21 21:35 |
MongoDB, NoSQL, Guidelines by Canonical- | Understanding MongoDB’s key features, benefits and use cases for modern data management | - | 2024-03-21 10:25 |
AWS vs MS Azure vs GCP vs OCI- | Comparing Cloud Providers: AWS vs. Microsoft Azure vs. Google Cloud Platform (GCP) vs. Oracle Cloud Infrastructure (OCI) | - | 2024-03-21 10:16 |
GraphQL vs REST vs gRPC- | Comparing Features of GraphQL, REST, and gRPC APIs | - | 2024-03-21 10:11 |
NAC (NETWORK ACCESS CONTROL) vs IAM (IDENTITY & ACCESS MANAGEMENT)- | Understanding the Differences in Network Access Control and Identity and Access Management | - | 2024-03-21 10:07 |
PRODUCTIVITY CHEAT SHEET- | Tips and Tricks for Enhanced Efficiency | - | 2024-03-21 10:05 |
data security vs data privacy vs data protection- | Data Security vs. Data Privacy vs. Data Protection: Understanding the Differences | - | 2024-03-21 09:57 |
Malware Types- | Understanding Malware Types: Descriptions, Delivery Methods, Payloads, and Countermeasures | - | 2024-03-21 09:51 |
API Security list- | A comprehensive checklist outlining essential security measures and best practices for securing APIs (Application Programming Interfaces), covering areas such as authentication, authorization, encryption, input validation, error handling, and more. | - | 2024-03-19 15:38 |
cloud pentesting- | A guide to conducting penetration testing on cloud-based systems and services, focusing on identifying and exploiting security vulnerabilities within cloud environments to enhance overall security posture. | - | 2024-03-19 15:06 |
Cloud Security with MITRE ATT&CK- | Cloud Security with MITRE ATT&CK® For Dummies®, AttackIQ Special Edition | - | 2024-03-19 15:04 |
ISO 27001 Mapped to NIST SP 800-53- | Controls Mapping | - | 2024-03-19 11:23 |
Kubernetes Errors & Troubleshooting Guide by DevOps Shack- | A comprehensive guide compiled by DevOps Shack covering common errors encountered in Kubernetes environments and providing troubleshooting techniques and solutions to resolve them effectively. | - | 2024-03-19 11:16 |
Kubernetes Interview Questions - | A curated collection of interview questions designed to assess candidates' knowledge and proficiency in Kubernetes, categorizing questions according to different levels of proficiency. | - | 2024-03-17 22:49 |
Detecting Brute Force Attacks- | Strategies, tools, and techniques for identifying and mitigating brute force attacks, enhancing security posture and safeguarding against unauthorized access attempts. | - | 2024-03-17 22:41 |
Cyber attacks and mitigation - | SOC ANALYST INTERVIEW QUESTIONS & ANSWERS | - | 2024-03-17 22:35 |
CI/CD Best Practices- | Learn How to Optimize CI/CD Pipelines | (FREE) | 2024-03-17 22:30 |
Change Management Form Template- | CHANGE MANAGEMENT FORM | - | 2024-03-17 22:21 |
DevOps 100 Basic To Advanced- | DevOps 100 Basic To Advanced . . . Interview Questions & answers | - | 2024-03-14 19:07 |
CLOUD SECURITY INTERVIEW QUESTIONS & ANSWERS- | A curated collection of interview questions and detailed answers focusing on cloud security topics | (FREE) | 2024-03-14 19:04 |
File Path Traversal- | A Deep Dive into File Path Traversal, Inclusion, and Upload Vulnerabilities | - | 2024-03-14 15:04 |
Terraform with Jenkins- | AUTOMATING INFRASTRUTURE WITH TERRAFORM | - | 2024-03-13 23:58 |
Cloud Security Model- | 𝐂𝐥𝐨𝐮𝐝 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐅𝐫𝐚𝐦𝐞𝐰𝐨𝐫𝐤 𝐟𝐨𝐫 𝐞𝐧𝐝-𝐭𝐨-𝐞𝐧𝐝 𝐬𝐞𝐜𝐮𝐫𝐢𝐭𝐲 | (FREE) | 2024-03-13 23:53 |
Bloodhound Active Directory Enumeration Tool- | A comprehensive guide providing detailed instructions for using Bloodhound, an open-source Active Directory reconnaissance tool. | - | 2024-03-13 23:50 |
AWS DevOps Interview Questions and Answers- | A curated collection of interview questions and detailed answers focused on AWS services and DevOps practices, designed to help candidates prepare effectively for DevOps-related roles in AWS environments. | - | 2024-03-13 23:38 |
50 Docker Commands- | 50 Docker Commands For Container Management, Image Manipulation, Networking & More | - | 2024-03-13 23:29 |
Operational Excellence Pillar AWS Well-Architected Framework- | Guidelines and best practices for implementing operational excellence within the AWS Well-Architected Framework, focusing on optimizing operational procedures, automating processes, and continuously improving system performance and reliability. | (FREE) | 2024-03-11 14:05 |
CompTIA Security 601 Study Guide- | Condensed notes covering essential topics relevant to preparing for the CompTIA Security+ certification exam, providing concise summaries and key points to aid in exam preparation. | - | 2024-03-10 17:32 |
AWS Security Incident Response Guide- | A guide for detecting, responding to, and mitigating security incidents within AWS environments, ensuring compliance with AWS security standards. | - | 2024-03-08 08:28 |
API SECURITY INTERVIEW QUESTIONS & ANSWERS- | Interview questions and answers focusing on API security, covering authentication, authorization, encryption, best practices, and common vulnerabilities, to help candidates prepare for API security roles. | - | 2024-03-08 08:23 |
Active Directory Security Checklist v2- | A comprehensive checklist outlining essential security measures and best practices for securing Active Directory environments, covering areas such as user authentication, access control, group policy management, auditing, and more. | - | 2024-03-08 08:17 |
Zero to hero- | Zero to hero in Google Cloud Platform (GCP) in one article. | - | 2024-03-08 08:12 |
Terraform Associate Certification Exam Practice- | Practice Questions | - | 2024-03-06 18:45 |
Network errors Linux - | Troubleshooting guide covering common network-related issues encountered on Linux systems, offering solutions and tips to resolve connectivity problems, configuration issues, and other network errors. | - | 2024-03-06 18:38 |
Microservices on AWS- | Implementing Microservices on AWS | - | 2024-03-06 18:34 |
50 Linux Command that Cloud Engineers should know- | A curated list of essential Linux commands tailored for cloud engineers, covering key functionalities for managing cloud infrastructure and deployments effectively. | - | 2024-03-06 09:26 |
The Ultimate SOC Career Guide for Beginners- | A comprehensive resource providing insights, tips, and strategies to help beginners kickstart their careers in Security Operations Centers (SOCs), covering essential skills, certifications, job roles, and career paths in the cybersecurity field. | - | 2024-03-06 09:24 |
CRTP Note (Reconnaissance)- | Detailed notes covering the Certified Red Team Professional (CRTP) course's reconnaissance phase, providing insights and strategies for effective reconnaissance operations. | - | 2024-03-03 07:47 |
WEB 3.0 SECURITY INTERVIEW QUESTIONS & ANSWERS- | A curated selection of interview questions and comprehensive answers focusing on security aspects in the context of Web 3.0 technologies, aiding candidates in interview preparation. | - | 2024-03-02 23:07 |
RDP (Remote Desktop Protocol) Penetration Testing- | A guide to conducting penetration testing on Remote Desktop Protocol (RDP) implementations to identify vulnerabilities and enhance security measures. | - | 2024-03-02 23:03 |
AWS Architect Certification: 350 Questions & Answers- | Dive into a thorough collection of questions and detailed answers to help you prepare effectively for AWS certification exams. | - | 2024-03-02 21:52 |
Proper Notes on OSI Model - | Comprehensive and organized notes providing a clear understanding of the OSI (Open Systems Interconnection) model, its seven layers, and their respective functions. | - | 2024-03-01 22:04 |
Guide to Practical Cyber Risk Management- | Implementing actionable strategies to identify, assess, and mitigate cyber risks effectively, ensuring robust protection against potential threats and vulnerabilities. | - | 2024-03-01 20:44 |
Database Security Requirement- | Essential measures and protocols ensuring the protection of sensitive data stored within databases, safeguarding against unauthorized access, data breaches, and compliance violations. | - | 2024-03-01 20:16 |
EDR vs. XDR vs.MDR Key Differences - | Comparison of EDR, XDR, and MDR solutions, aiding organizations in selecting the best threat detection and response platform. | - | 2024-03-01 20:13 |
Key Elements of Web3 Security- | Explore essential components and strategies for securing Web3 applications | - | 2024-03-01 20:07 |
Kubernetes Troubleshooting- | A hands-on practitioner’s guide to solving some of Kubernetes’ toughest operational issues | - | 2024-02-29 09:48 |
AZ-900: Microsoft Azure Fundamentals- | A beginner-friendly guide covering the foundational concepts of Microsoft Azure, providing an introduction to cloud computing principles, Azure services, and basic cloud concepts essential for understanding and working with Azure. | - | 2024-02-29 09:39 |
Local and virtual network gateways in Azure- | Gain insights into Azure's network gateway offerings, including local and virtual gateways, enabling secure connectivity between on-premises networks and Azure resources, facilitating hybrid cloud deployments. | - | 2024-02-29 09:36 |
Azure Firewall- | Learn about Microsoft Azure's native firewall service designed to protect Azure Virtual Network resources, providing network-level protection and granular access control for applications and resources hosted in Azure. | - | 2024-02-29 09:23 |
6 ways Terraform can help secure your infrastructure- | Explore six practical strategies for leveraging Terraform to enhance the security of your infrastructure, empowering organizations to implement robust security measures in a cloud-native environment. | - | 2024-02-29 09:16 |
SOC Analyst Interview Questions & Answers- | A comprehensive compilation of interview questions and detailed answers specifically tailored for SOC (Security Operations Center) analyst roles, designed to help candidates prepare effectively and demonstrate their expertise in cybersecurity operations. | - | 2024-02-28 07:30 |
Top MNC - AWS/DevOps Interview Questions for 2024- | A curated collection of high-quality interview questions tailored for AWS and DevOps roles in top multinational companies, designed to help candidates prepare effectively and excel in interviews. | - | 2024-02-28 07:23 |
A beginner's guide to Gitops- | An introductory resource providing a clear and accessible overview of GitOps principles, workflows, and best practices, empowering beginners to understand and implement GitOps methodologies effectively. | - | 2024-02-28 07:04 |
OSI Reference Model Cheat Sheet- | Your quick reference guide to the OSI (Open Systems Interconnection) reference model, providing a succinct overview of its seven layers and key concepts for easy understanding and application. | - | 2024-02-27 09:17 |
Linux troubleshooting with example and solution- | A practical guide featuring common Linux issues, accompanied by detailed examples and step-by-step solutions, enabling users to diagnose and resolve problems efficiently. | - | 2024-02-19 17:52 |
94. Privacy Program Management- | Dive into effective strategies and frameworks for managing privacy programs, ensuring compliance with regulations, protecting sensitive data, and fostering trust among stakeholders. | (FREE) | 2024-02-15 16:07 |
Registry Attack Vectors- | Investigate potential vulnerabilities and exploitable entry points within registries, empowering cybersecurity professionals to proactively identify and mitigate threats targeting critical infrastructure components. | - | 2024-02-15 16:03 |
Common Attacks: Detection and Mitigation- | Explore prevalent cyber threats, learn effective detection techniques, and discover mitigation strategies to safeguard against common attacks, ensuring robust security posture. | - | 2024-02-13 13:34 |
110+ DevOps Interview Questions and Answers for 2023- | A comprehensive collection of interview questions and detailed answers tailored for DevOps roles, designed to help candidates prepare effectively and excel in interviews | - | 2024-02-13 12:06 |
Docker Complete- | Your ultimate guide to Docker, covering everything from the basics to advanced strategies, making containerization and application deployment easy to understand and implement. | - | 2024-02-12 20:50 |
DevSecOps Best Practices Guide- | Access a comprehensive guide outlining essential best practices for integrating security into the DevOps lifecycle, empowering organizations to build and deploy secure software with confidence. | - | 2024-02-12 20:46 |
Hardening Cisco Firepower- | A comprehensive resource detailing best practices and procedures for securing and hardening Cisco Firepower appliances, ensuring robust protection against cyber threats and vulnerabilities. | - | 2024-02-12 20:39 |
Secure Coding Practices- | Explore essential principles, guidelines, and techniques for writing secure code, mitigating common vulnerabilities, and fostering a proactive approach to software security. | - | 2024-02-11 14:53 |
Jenkins Interview Questions- | A curated collection of commonly asked interview questions focused on Jenkins, covering topics such as continuous integration, automation, pipeline management, and more, to help candidates prepare effectively for Jenkins-related roles. | - | 2024-02-11 14:51 |
AWS Incident Response Cheat-sheet- | A concise reference tool outlining key steps and best practices for effectively responding to security incidents in AWS environments, facilitating swift and efficient incident resolution. | - | 2024-02-11 14:49 |
DATABASE SECURITY CHECKLIST.- | A comprehensive checklist outlining essential security measures and best practices to ensure the protection of sensitive data stored in databases, mitigating risks and preventing unauthorized access or breaches. | - | 2024-02-11 14:46 |
OSCP Notes- | A compilation of detailed notes covering topics relevant to the Offensive Security Certified Professional (OSCP) certification exam, providing valuable insights, tips, and techniques for successful penetration testing. | - | 2024-02-09 21:03 |
AWS Interview Guide- | A comprehensive resource featuring commonly asked interview questions and detailed answers, designed to help candidates prepare effectively and excel in interviews for AWS-related roles. | - | 2024-02-06 18:45 |
AWS Cloud Migration- | Gain insights into the step-by-step process of migrating enterprise infrastructure to the AWS cloud, leveraging best practices, tools, and strategies tailored for large-scale deployments. | - | 2024-02-06 18:29 |
Prompt Injection Attacks Handbook- | A comprehensive resource providing insights into prompt injection attacks, strategies for risk management, and datasets for analysis, facilitating effective mitigation and response strategies. | - | 2024-02-06 14:44 |
The API-First Enterprise- | Explore the paradigm shift towards API-centric strategies, guiding organizations in prioritizing API development as a foundational element for innovation, collaboration, and digital transformation. | - | 2024-02-06 10:21 |
Application control for dummies- | Simplify complex concepts and strategies surrounding application control with this beginner-friendly guide, offering insights and best practices for securing and managing applications effectively. | - | 2024-02-05 16:52 |
Penetration Testing CHEAT Sheets- | Access concise and practical reference materials packed with essential tips, commands, and methodologies for conducting effective penetration tests, facilitating efficient and thorough security assessments. | - | 2024-02-05 15:17 |
Phishing Email Analysis- | Learn effective techniques and tools for analyzing phishing emails, empowering cybersecurity professionals to identify, investigate, and mitigate email-based threats. | - | 2024-02-05 15:08 |
CompTIA Security+ Exam Guide- | Master the foundational principles of cybersecurity with the CompTIA Security+ certification, validating essential skills in risk management, threat detection, and network security | - | 2024-02-05 15:06 |
AKS Basic Network Technical Paper- | Explore a comprehensive technical paper outlining fundamental networking concepts and configurations for Azure Kubernetes Service (AKS), empowering users to build and manage scalable containerized applications with ease. | - | 2024-02-05 15:02 |
SOC Interview Questions- | Access a curated collection of interview questions tailored for Security Operations Center (SOC) roles, covering a range of topics to help candidates prepare effectively and demonstrate their expertise in cybersecurity operations. | - | 2024-02-04 00:02 |
NIST Incident Response Guide- | Delve into the National Institute of Standards and Technology (NIST) guide for incident response, offering systematic approaches and best practices to effectively detect, respond to, and recover from cybersecurity incidents. | - | 2024-02-03 23:38 |
NIST Cybersecurity framework 2.0 - cyphere-1- | NIST Cybersecurity Framework, offering comprehensive guidance and best practices to enhance cybersecurity resilience across organizations of all sizes and sectors. | - | 2024-02-03 23:28 |
MSSQL Injection vol.2- | Learn about the vulnerabilities and mitigation techniques associated with SQL injection attacks targeting Microsoft SQL Server databases, ensuring robust security measures are in place to prevent unauthorized access and data breaches. | - | 2024-02-03 23:21 |
DNS Security- | Explore essential strategies and best practices to fortify Domain Name System (DNS) infrastructure against cyber threats, ensuring reliability, integrity, and confidentiality of DNS services. | - | 2024-02-03 23:19 |
CLF-C02 Exam-Guide- | AWS Certified Cloud Practitioner (CLF-C02) Exam Guide | (FREE) | 2024-02-01 17:40 |
API Security Tips vol.2- | A curated checklist encompassing essential security measures to safeguard APIs against vulnerabilities and threats, ensuring robust protection of sensitive data and resources. | (FREE) | 2024-02-01 17:36 |
Kubernetes Basic Concept- | Basic to Advance | - | 2024-02-01 17:34 |
Information Security Continuous Monitoring Architecture- | A robust framework designed to ensure ongoing vigilance and proactive risk management in information security, enhancing resilience against evolving threats | - | 2024-02-01 17:28 |
ISO 27001-2022- | ISMS Implementation Toolkit | - | 2024-02-01 17:22 |
SAA-C03 AWS Certified Solutions Architect – Associate Master Cheat Sheet- | Your go-to resource for mastering AWS solutions architecture, packed with essential insights, best practices, and practical examples to boost your proficiency. | - | 2024-01-31 22:37 |
Guidelines for Managing the Security of Mobile Devices- | A comprehensive set of best practices and recommendations for effectively securing mobile devices, ensuring data protection and mitigating security risks. | - | 2024-01-29 15:16 |
Networking for DevOps- | A practical guide tailored for DevOps professionals | - | 2024-01-27 09:59 |
Terraform From Beginners to Master- | A comprehensive learning journey covering Terraform, guiding beginners to mastery in infrastructure as code and cloud provisioning. | - | 2024-01-26 17:15 |
DevSecOps Security Checklist- | A comprehensive checklist outlining essential security practices to integrate seamlessly within the DevOps lifecycle, ensuring robust application security. | - | 2024-01-26 17:09 |
Ultimate DevSecOps library- | A curated collection encompassing comprehensive resources on integrating security into the DevOps lifecycle, fostering a culture of continuous security improvement. | (FREE) | 2024-01-23 11:27 |
Top 50 Attack- | Explore and understand the most prevalent 50 cyber attacks, equipping cybersecurity professionals with insights for robust defense strategies. | - | 2024-01-23 11:23 |
Splunk Queries for SOC Analyst - | Enhance security operations with targeted Splunk queries, empowering SOC analysts to efficiently analyze and respond to security incidents. | - | 2024-01-23 11:21 |
RISK Level Self-assessment- | Evaluate and gauge risk levels through a self-assessment process, promoting informed decision-making and proactive risk management strategies. | - | 2024-01-23 11:16 |
The Twelve-Factor App- | Uncover key principles for building modern, scalable, and maintainable web applications, emphasizing best practices for cloud-native development. | - | 2024-01-22 03:08 |
TOP 250+ Interviews Questions on AWS- | Explore a comprehensive compilation of over 250 top interview questions on AWS, covering a wide range of topics to help you prepare for success in AWS-related interviews. | - | 2024-01-22 02:54 |
Load Balancer Algorithms- | Gain insights into various load balancing methods, optimizing resource distribution and enhancing system performance. | - | 2024-01-22 02:51 |
AZ-104: Azure Administrator Associate Quick Reference Guide- | Quick Reference Guide to mastering Microsoft Azure administration, covering subscription management, identity security, infrastructure, virtual networking, storage solutions, virtualization, web app deployment, and solution monitoring. | - | 2024-01-22 02:43 |
How to Improve API Performance- | Dive into practical tips on improving API performance | (FREE) | 2024-01-21 11:08 |
API Security Tips- | Elevate your API security posture with this insightful compilation of tips, designed to fortify your organization's application programming interface (API) defenses. | - | 2024-01-21 11:02 |
SHODAN Cheat Sheet - | Unlock the power of SHODAN with this comprehensive cheat sheet, navigate through quick-reference tips, commands, and advanced techniques to optimize your SHODAN queries for discovering vulnerable devices and exposed services. | - | 2024-01-21 10:58 |
Cybersecurity Search Engines- | This resource is a valuable reference for cybersecurity professionals and enthusiasts seeking effective search engine solutions to bolster their defense mechanisms, identify potential risks, and stay abreast of the latest developments in the field. | (FREE) | 2024-01-21 10:54 |
Hacker Search Engines- | Delve into the world of hacker search engines with this insightful table, offering an overview of platforms utilized for reconnaissance | (FREE) | 2024-01-21 10:51 |
Incident Response For Common Attack Types- | Explore proactive measures, detection mechanisms, and step-by-step response protocols designed to mitigate the impact of prevalent cyber threats. | - | 2024-01-21 10:33 |
Risk Assessment and Treatment Process- | Information security is fortified through ISO/IEC 27001 adoption, emphasizing risk management and continuous improvement to safeguard reputation and achieve objectives. | - | 2024-01-20 15:04 |
150 Practical Examples In Python- | Python NumPy for efficient numerical computations, featuring Universal Functions (ufuncs) for powerful element-wise array operations and a detailed exploration of creation, categories, and specific use cases. | - | 2024-01-19 20:05 |
Malware Analysis 101 created by ChatGPT-1- | Discover the essentials of malware analysis by ChatGPT covering behavior, techniques, and tools for a deeper understanding of this crucial field. | (FREE) | 2024-01-19 12:29 |
LPE – Overview- | Overview of Linux Privilege Escalation | - | 2024-01-19 12:19 |
Migrate from Oracle to PostgreSQL- | How to migrate from Oracle to PostgreSQL | - | 2024-01-17 17:29 |
ISO 2700-2022 Audit Checklist Part-3- | Audit Checklist Part 3 A.6 People Controls & A.7 Physical Controls | (FREE) | 2024-01-16 11:34 |
ISO 27001 SOA- | ISO 27001:2022: SOA - Statement Of Application | (FREE) | 2024-01-16 10:56 |
ISO 27001 Audit Checklist - Part 2- | Comprehensive audit tool for assessing information security management practices in accordance with ISO 27000 standards. | (FREE) | 2024-01-16 09:57 |
ISO 2700_2022 Audit Checklist- | Comprehensive audit tool for assessing information security management practices in accordance with ISO 27000 standards. | (FREE) | 2024-01-16 09:29 |
Log Analysis- | Discover log analysis insights, from understanding log files and demystifying proxy logs to building essential Linux skills, through expert guidance by @iamswetha07(LinkedIn) | - | 2024-01-16 00:25 |
Essential Bash Operations- | Elevate your Bash proficiency with a comprehensive guide featuring over 150 essential commands for efficient shell operations and scripting. | - | 2024-01-15 23:49 |
Important Git Operations- | Unlock Git mastery with a concise guide covering over 100 essential commands for efficient version control and collaboration. | - | 2024-01-15 23:35 |
Load Balancer in Azure- | Learn the key components of Azure Load Balancers, optimizing application scalability and ensuring high availability through effective traffic distribution and multiple service instances. | - | 2024-01-15 22:51 |
How To Use Terraform like a Pro- | Master advanced Terraform techniques for expert-level infrastructure management. | - | 2024-01-15 21:09 |
SQL Normalisation, Constraints, ERD and ACID Properties- | Research on Database Normalization | - | 2024-01-14 20:14 |
Introduction- | AWS | - | 2023-12-27 13:27 |
Cisco Commands- | Fawzy Abdelbaset | - | 2023-12-27 12:49 |
Security Requirements- | by John Stewart | - | 2023-12-16 09:40 |
Linux Shell Scripting- | Mastering. Complete guide | - | 2023-12-10 13:24 |
Design Patterns- | Used Across Different Software Layers | - | 2023-12-10 12:30 |
Linux log parsing- | Text manipulation and data analysis commands | - | 2023-12-10 12:07 |
Terraform CLI- | Cheat Sheet | - | 2023-12-10 08:44 |
Cyber Incident Response Plan- | Templates and Checklists | - | 2023-11-30 18:20 |
Terms SOC Analyst To Know- | Terms & Windows Command Shells | - | 2023-11-30 16:54 |
API Security Maturity Model- | White paper - Salt security | - | 2023-11-25 20:50 |
The Windows Process Journey- | Version 3.0 - June 2023 | - | 2023-11-23 21:16 |
WAF Bypass Methods- | Web Application Security | - | 2023-11-23 21:00 |
Zero Trust Reference Architecture- | Department of Defense | - | 2023-11-23 20:22 |
Zero Trust Checklist- | "" | - | 2023-11-23 19:55 |
GUIDELINES FOR DIGITAL FORENSICS - | FIRST RESPONDERS | - | 2023-11-19 19:51 |
Pro hints- | Guide | - | 2023-11-19 19:19 |
NIST 800-160- | Developing Cyber-Resilient Systems | - | 2023-11-19 19:01 |
CISSP Concepts- | Guide | - | 2023-11-19 18:21 |
JSON Tests for Authentication Endpoints- | API Security Cheatsheet | - | 2023-11-19 17:45 |
12+ Ways to Hack Multi-Factor Authentication- | e-book | - | 2023-11-19 17:20 |
SOC Operations- | Standard operating procedure | - | 2023-10-25 12:17 |
AZ-900 Exam Guide- | Microsoft Azure Fundamentals | - | 2023-10-25 11:50 |
Building a Secure SDLC- | DAZZ | - | 2023-10-25 11:45 |
OSCP Extended Cheat Sheet- | By 0xsyr0 | - | 2023-10-22 11:05 |
OSCP Cheatsheet- | Offensive security | - | 2023-10-09 18:59 |
OSCP Cheatsheet- | Offensive security | - | 2023-10-09 18:26 |
Network Security- | Best Practices | - | 2023-10-09 18:08 |
Blockchain Security - | A Framework for Trust and Adoption | - | 2023-10-08 08:32 |
Style guide- | PowerShell Style Guide | - | 2023-10-08 07:56 |
Best practices- | PowerShell Best Practices | - | 2023-10-08 07:05 |
Helm cheatsheet- | "" | - | 2023-10-08 07:03 |
Cheatsheet part.2- | Comprehensive Python Cheatsheet part 2 | - | 2023-10-06 17:47 |
Cheatsheet part.1- | Comprehensive Python Cheatsheet | - | 2023-10-06 17:43 |
Comprehensive cheatsheet part.2- | Comprehensive Python Cheat Sheet by gto76 | - | 2023-10-06 17:36 |
Commands Ad.- | 100+ Essential Linux Commands | - | 2023-10-06 17:21 |
Linux networking- | Guide 101 | - | 2023-10-05 20:16 |
Reverse Shell v2- | Cheat Sheet | - | 2023-10-05 19:54 |
PCSE - Professional Cloud Security Engineer- | CLI Tips and Tricks | - | 2023-10-05 11:21 |
Docker Interview Questions- | Interviewbit | (FREE) | 2023-10-04 16:15 |
NIST 800-12- | An Introduction to Information Security | - | 2023-10-04 12:24 |
Active directory enumeration- | OFFENSIVE ENUMERATION IN ACTIVEDIRECTORY | - | 2023-10-01 16:25 |
Local Persistence- | By Mohamed Adel | - | 2023-10-01 16:17 |
Learning Groovy- | eBook | - | 2023-10-01 16:09 |
Hacking with Go- | Manual | - | 2023-10-01 15:59 |
Windows- | Incident response cheatsheet | - | 2023-10-01 15:55 |
Linux- | Incident response cheatsheet | - | 2023-10-01 15:31 |
SOC open source- | Guide | - | 2023-09-30 13:29 |
SQL Dorks- | Uri injection cheatsheet | - | 2023-09-30 13:26 |
DNS Attack- | Root Cause Analysis with Detection Ideas | - | 2023-09-30 13:17 |
Directory Traversal- | Talha Eroglu, Ilgaz Senyuz, Okan Yildiz | - | 2023-09-30 13:06 |
CISSP Study Guide- | CERTIFICATION TRAINING | - | 2023-09-30 11:33 |
Cisco Umbrella- | Design Guide | - | 2023-09-30 10:39 |
CTI and Risk Management- | Integrating Cyber Threat Intelligence and Risk Management | - | 2023-09-09 16:17 |
OWASP Top 10 API Security Risks- | updated 2023 | - | 2023-09-03 07:11 |
netcat cheatsheet- | For pentester by hackingarticles | - | 2023-09-03 06:32 |
NIST CSF 2.0- | Public Draft | - | 2023-08-30 15:17 |
NIST 800-207- | Zero Trust Architecture | - | 2023-08-30 12:27 |
SSH guide- | "" | - | 2023-08-30 12:08 |
Devops dump 08.2023- | 123 questions and answers | - | 2023-08-30 11:57 |
Azure Dump 08.2023- | Top 50 Azure Interview Questions and Answers | - | 2023-08-30 11:36 |
Container security- | QUESTIONS & ANSWERS | (FREE) | 2023-08-30 11:21 |
CEH cheatsheet- | Certified Ethical Hacker (CEH) Exam Cheat Sheet | - | 2023-08-11 17:43 |
AWS dump 08.2023- | by CREDO SYSTEMZ | - | 2023-08-11 17:40 |
Pentest Cheat Sheets- | by Ninja Tricks | - | 2023-08-05 18:42 |
Nginx handbook- | Essential Nginx Commands / Concepts | - | 2023-08-05 16:40 |
73. Third-Party Risk Management: Third Party Risk Management Program- | Third Party Risk Management Program | (FREE) | 2023-08-05 16:18 |
63. Systems Management: System Development and Acquisition- | System Development and Acquisition | (FREE) | 2023-08-05 16:15 |
62. Systems Management: Managing the System Development Life Cycle (SDLC)- | Managing the System Development Life Cycle (SDLC) | (FREE) | 2023-08-05 16:11 |
75. Third-Party Risk Management: Managing Contracts with Third Parties- | Managing Contracts with Third Parties | (FREE) | 2023-08-05 16:09 |
65. Systems Management: Management of Operational Software- | Management of Operational Software | (FREE) | 2023-08-05 16:06 |
64. Systems Management: Infrastructure Management- | Infrastructure Management | (FREE) | 2023-08-05 16:04 |
72. Systems Management: Equipment Maintenance- | Equipment Maintenance | (FREE) | 2023-08-05 16:02 |
66. Systems Management: Controlling Interconnected Information Systems- | Controlling Interconnected Information Systems | (FREE) | 2023-08-05 15:58 |
68. Systems Management: Configuration Management- | Configuration Management | (FREE) | 2023-08-05 15:56 |
76. Third-Party Risk Management: Communicating Security Requirements for Third Parties- | Communicating Security Requirements for Third Parties | (FREE) | 2023-08-05 15:53 |
71. Systems Management: Capacity Management- | Capacity Management | (FREE) | 2023-08-05 15:45 |
69. Systems Management: Baseline System and Device Configurations- | Baseline System and Device Configurations | (FREE) | 2023-08-05 15:39 |
67. Systems Management: Application Security- | Application Security | (FREE) | 2023-08-05 15:33 |
61. Systems Management: Separation of Production & Non-Production Environments- | Separation of Production & Non-Production Environments | (FREE) | 2023-07-20 14:04 |
AWS MySQL migration- | Best Practices for Migrating MySQL to AWS | - | 2023-07-17 16:24 |
Volatility Framework- | Memory Forensics | - | 2023-07-17 16:05 |
57. Communications Security: Securing the Exchange of Information- | Securing the Exchange of Information | (FREE) | 2023-07-17 15:40 |
Comprehensive cheatsheet part.1- | Comprehensive Python Cheat Sheet by gto76 | (FREE) | 2023-07-16 10:00 |
Python cheatsheet- | Python 3 Cheat Sheet by WebsiteSetup | - | 2023-07-16 08:56 |
SOC Basics- | Basics of Security Operations Center (SOC) | - | 2023-07-16 08:43 |
Overview- | Amazon Virtual Private Cloud | - | 2023-07-15 17:06 |
56. Communications Security: Network Protection Controls- | Network Protection Controls | (FREE) | 2023-07-15 16:57 |
55. Operations Security: Penetration Testing- | Penetration Testing | (FREE) | 2023-07-15 16:55 |
54. Operations Security: Boundary Defense- | Boundary Defense | (FREE) | 2023-07-15 16:52 |
53. Operations Security: Cybersecurity Tools and Technologies- | Cybersecurity Tools and Technologies | (FREE) | 2023-07-15 16:50 |
MSSQL Injection- | MSSQL Injection cheatsheet | - | 2023-07-09 11:20 |
Forensic post exploit- | Windows forensic post exploit cheatsheet | - | 2023-07-09 11:06 |
Ransomware: Rescue Manual- | What You Need to Know to Prepare and Recover from a Ransomware Attack | - | 2023-07-09 09:27 |
Kubernetes on AWS- | AWS summit 2018 | - | 2023-07-09 08:41 |
scapy- | SCAPY cheatsheet | - | 2023-07-09 08:15 |
Wireshark display filters- | WIRESHARK DISPLAY FILTERS by packetlife.net | - | 2023-07-09 07:52 |
52. Operations Security: Flaw Remediation and Fault Logging- | Flaw Remediation and Fault Logging | (FREE) | 2023-07-08 13:50 |
49. Operations Security: Malware Prevention- | Malware Prevention | (FREE) | 2023-07-08 13:48 |
48. Physical Security: Protection of Physical Media in Transit- | Protection of Physical Media in Transit | (FREE) | 2023-07-08 13:45 |
Monitoring and alerts - | Prometheus/Grafana: installation and configuration | - | 2023-07-08 11:47 |
Nginx cheatsheet- | Nginx basics Cheat Sheet | - | 2023-07-08 11:27 |
Nginx cheatsheet- | Nginx basics Cheat Sheet | - | 2023-07-08 11:24 |
Information Security Policy template- | GDPR Toolkit Version 4 | - | 2023-07-08 11:11 |
Build SOC (AT&T)- | How to build a Security Operations Center by AT&T | - | 2023-07-08 10:19 |
CLI Tools Cheatsheet- | Cloud Pentesting Cheatsheet: AWS, Azure, GCP | - | 2023-07-08 09:42 |
51. Operations Security: Audit Logging and Monitoring- | Audit Logging and Monitoring | (FREE) | 2023-07-08 09:24 |
Attack Surface & Attack Tree- | Description and remodiation | (FREE) | 2023-07-06 18:09 |
47. Physical Security: Security of Information Assets While Off-Premises- | Security of Information Assets While Off-Premises | (FREE) | 2023-07-06 17:00 |
NIST CSF checklist- | NIST Cybersecurity Framework checklist | - | 2023-07-03 16:51 |
45. Physical Security: Environmental Controls- | Environmental Controls | (FREE) | 2023-07-03 16:46 |
46. Physical Security: Managing Supporting Utilities- | Managing Supporting Utilities | (FREE) | 2023-07-03 16:44 |
43. Physical Security: Cabling Protection- | Cabling Protection | (FREE) | 2023-07-03 16:41 |
TCP/UDP Port cheatsheet- | TCP/UDP Port Numbers cheat sheet | - | 2023-07-02 13:05 |
md- | MARKDOWN cheat sheet | - | 2023-07-02 12:28 |
IEEE 802.1X cheatsheet- | 802.1X: Port-Based Network Access Control cheat sheet | - | 2023-07-02 12:14 |
CISSP cheatsheet- | Certified Information Systems Security Professional cheat sheet | - | 2023-07-01 16:50 |
44. Physical Security: Unattended Information Systems- | Unattended Information Systems | (FREE) | 2023-07-01 16:35 |
Checklist (Arie Bregman)- | SRE checklist by Arie Bregman | - | 2023-06-29 14:14 |
OIDC vs SAML vs OAuth2.0- | OpenID Connect vs Security Assertion Markup Language vs OAuth2.0 | - | 2023-06-29 13:42 |
DevOps by IBM- | DevOps For Dummies | - | 2023-06-28 16:12 |
36. Access Management: Managing Wireless Access- | Managing Wireless Access | (FREE) | 2023-06-28 16:06 |
State of SRE by Dynatrace- | State of SRE: 2022 Edition | (FREE) | 2023-06-28 14:50 |
Kubernetes questions 07.2023- | KUBERNETES SME QUESTIONS AND ANSWERS | - | 2023-06-28 14:39 |
39.Access Management: Protecting Publicly Accessible Content- | Protecting Publicly Accessible Content | (FREE) | 2023-06-28 14:34 |
41. Physical Security: Maintaining Physical Entry Controls- | Maintaining Physical Entry Controls | (FREE) | 2023-06-28 14:31 |
42. Physical Security: IT Equipment Placement and Protection- | IT Equipment Placement and Protection | (FREE) | 2023-06-28 14:29 |
40. Physical Security: Establishing Physical Security Perimeters- | Establishing Physical Security Perimeters | (FREE) | 2023-06-28 14:27 |
38. Access Management: Controlling the Use of System Utilities- | Controlling the Use of System Utilities | (FREE) | 2023-06-28 14:24 |
37. Access Management: Protection for Mobile Computing and Working Remotely- | Protection for Mobile Computing and Working Remotely | (FREE) | 2023-06-28 14:20 |
Security Shift-Left- | The Ultimate Guide to Security | - | 2023-06-24 18:52 |
RISK MANAGEMENT PROCESS- | INFORMATION SECURITY RISK MANAGEMENT PROCESS | - | 2023-06-24 18:35 |
Azure pentesting- | Azure pentest tools | - | 2023-06-24 09:55 |
32. Access Management: Secure Logon- | Access Management: Implementing and Maintaining Secure Logon Processes | (FREE) | 2023-06-24 09:47 |
Best practices- | How to use Terraform like a Pro | - | 2023-06-23 14:47 |
34. Access Management: System and Session Timeouts- | System and Session Timeouts | (FREE) | 2023-06-23 14:36 |
33. Access Management: Effective Password Management- | Effective Password Management | (FREE) | 2023-06-23 13:56 |
AWS pentesting- | AWS pentesting tools | - | 2023-06-23 11:25 |
Linux monitoring tools- | Linux System Monitoring Tools Every SysAdmin Should Know | - | 2023-06-23 10:50 |
DevSecOps fundamentals- | DevSecOps Tools & Activities | - | 2023-06-22 14:56 |
SQL vs NoSQL in Cloud- | SQL vs NoSQL: cheatsheet for AWS, Azure and GCP | - | 2023-06-22 14:00 |
Azure Tips and Tricks- | by azuredev.tips | - | 2023-06-21 17:53 |
SecOps by BMC- | SecOps for Dummies | - | 2023-06-20 16:21 |
GitOps- | An introduction to GitOps | - | 2023-06-20 16:02 |
Git dump 06.2023- | GIT Interview Questions & Answers | - | 2023-06-20 16:00 |
Azure CAF Decision Tree- | Technical Breakdown of the 4 Key Sections | (FREE) | 2023-06-20 15:48 |
Load balancing review- | Azure load-balancing options | (FREE) | 2023-06-20 06:52 |
Static web hosting- | Hosting Static Websites on AWS | - | 2023-06-19 16:27 |
Guide- | Prometheus Monitoring Guide by Sysdig | - | 2023-06-18 16:29 |
Kubernetes CRI- | Introduction to Kubernetes Container Runtime Interface (CRI) | (FREE) | 2023-06-18 14:55 |
Deploy with GitLab- | A single application for Lambda, Fargate, EC2, EKS, and ECS | - | 2023-06-18 13:55 |
cron- | CRON trigger cheat sheet | - | 2023-06-18 13:39 |
Fortigate: debug and diagnose- | Debug and diagnose commands complete cheat sheet | - | 2023-06-18 12:20 |
Kubernetes security: StackRox- | Kubernetes Security Platform | - | 2023-06-18 12:04 |
302 – F5 Certified Technology Specialist- | BIG-IP GTM – DNS Specialist | - | 2023-06-17 14:40 |
Docker tutorial- | All about Docker concept | - | 2023-06-17 13:18 |
EKS monitoring: Prometheus, Grafana, Helm- | EKS monitoring using Helm, Prometheus and Grafana Dashboard | - | 2023-06-16 16:54 |
DevOps dump 02.2023- | DevOps interview questions | - | 2023-06-16 16:31 |
OWASP API Security Top 10- | Top 10 API security vulnerabilities and MITRE ATTCK framework relation | - | 2023-06-16 15:55 |
29. Access Management: Continuous Account Management- | Continuous Account Management | (FREE) | 2023-06-16 15:46 |
Otter and BuildMaster- | CI/CD for Infrastructure & Configuration Management | - | 2023-06-16 15:06 |
Kubernetes: best practices- | Best practices for Kubernetes Pods | - | 2023-06-15 18:00 |
Services Cheatsheet- | AMAZON WEB SERVICES CHEAT SHEET | (FREE) | 2023-06-15 16:53 |
Active Directory Pentesting- | Exploitation, Detection, and Mitigation Strategies | - | 2023-06-14 15:48 |
tcpdump/tcpreplay/tcprewrite- | tcpdump/tcpreplay cheat sheet | - | 2023-06-14 13:05 |
VS Code Shortcuts- | VS Code Shortcuts CheatSheet | (FREE) | 2023-06-11 11:05 |
Nmap cheatsheet- | Nmap Cheat Sheet | - | 2023-06-11 10:31 |
Red Hat: The Essentials- | ANSIBLE BEST PRACTICES: THE ESSENTIALS | - | 2023-06-11 10:04 |
23. Acceptable Use: Defining and Enforcing Acceptable Use of Assets- | Defining and Enforcing Acceptable Use of Assets | (FREE) | 2023-06-11 09:59 |
26. IT Asset Management: Shadow IT- | Accounting for Shadow IT and End-of-Life (EOL) Assets | (FREE) | 2023-06-11 09:54 |
IaC: with Terraform and Ansible- | AZURE INFRASTRUCTURE AS CODE using Terraform, Ansible and VS Studio 2019 | - | 2023-06-10 17:59 |
DOCKER CHEATSHEET- | For developers | - | 2023-06-10 17:42 |
Cloud Security (Fujitsu)- | The definitive guide to managing risk in the new ICT landscape by Fujitsu | (FREE) | 2023-06-10 16:23 |
22. Personnel Security: Awareness Training- | Running an Effective Security Awareness Training Program | (FREE) | 2023-06-10 16:13 |
awk- | How To Use awk In Bash Scripting | - | 2023-06-10 15:56 |
Mobile Application PenTesting- | PenetrationTesting Cheat Sheet | - | 2023-06-09 19:08 |
Kubernetes guide- | A PRACTICAL GUIDE | - | 2023-06-09 13:39 |
Kubernetes security- | Kubernetes Security Cheat Sheet | (FREE) | 2023-06-09 13:13 |
Jenkins 101- | Getting Started With Jenkins! | - | 2023-06-09 11:14 |
Pipeline Tutorial- | Jenkins Pipeline Tutorial | - | 2023-06-09 10:26 |
Prevent SSH Brute-Force- | 5 Best Practices to Prevent SSH Brute-Force Login Attacks in Linux | - | 2023-06-09 10:22 |
KUBERNETES 06.2023- | Dump 06.2023 | - | 2023-06-09 09:47 |
COMPTIA Security+ Sceneria- | Master Cheat Sheet | - | 2023-06-08 17:08 |
Azure Dump 06.2023- | Microsoft Azure Interview Questions | - | 2023-06-08 17:02 |
Red Hat: Ansible Best Practices- | How to write, how to execute, and how to use in real life | - | 2023-06-08 16:02 |
Postmortem analysis- | Postmortem Culture and best practices | - | 2023-06-07 14:09 |
Service Reliability Hierarchy- | Google SRE book: Practices | - | 2023-06-07 09:02 |
Kustomize cheatsheet- | Kustomize: Declarative Management of Kubernetes Objects | - | 2023-06-06 14:06 |
NGINX as an API Gateway- | Deploying NGINX as an API Gateway | - | 2023-06-05 17:20 |
Guide- | Getting started with nginx | - | 2023-06-05 17:00 |
Subnet Cheat Sheet- | 24 Subnet Mask, 30, 26, 27, 29, and other IP Address CIDR Network References | - | 2023-06-05 08:53 |
Terraform state in Azure Storage- | Store Terraform state in Azure Storage with concurrency lock | - | 2023-06-05 08:22 |
Kubernetes troubleshooting vol.2- | A hands-on practitioner’s guide to solving some of Kubernetes’ toughest operational issues | - | 2023-06-04 10:51 |
Kubernetes networking- | Diving Deep into Kubernetes Networking | - | 2023-06-04 09:26 |
10 PKI Use Cases- | for Stronger Enterprise Security | - | 2023-06-04 09:10 |
Docker Q&A 06.2023- | Docker interview questions and answers | - | 2023-06-04 07:33 |
HashiCorp Vault- | Centralized Secrets Management with HashiCorp Vault on AWS White Paper | - | 2023-06-03 12:13 |
CI/CD with Docker and Kubernetes- | How to Deliver Cloud Native Applications at High Velocity | - | 2023-06-03 11:11 |
Kubernetes hardening- | From National Security Agency (NSA); Cybersecurity and Infrastructure Security Agency (CISA) | - | 2023-06-03 09:29 |
AWS storage- | AWS S3 notes, best practice | - | 2023-06-03 09:13 |
SQL dump 06.2023- | SQL questions dump | - | 2023-06-02 15:36 |
Azure Data engineer 06.2023- | Azure Data Engineer INterview Questions | - | 2023-06-02 15:16 |
Azure Storage dump 06.2023- | Azure Storage interview questions | - | 2023-06-01 16:50 |
System design rules- | 25 Golden Rules to answer in a System Design | - | 2023-06-01 16:48 |
Google SRE best practices- | A Collection of Best Practices for Production Services | - | 2023-06-01 16:37 |
Availability table- | SLA and availability time calculation | - | 2023-05-31 19:48 |
WiFi PenTesting Guide- | WiFi Penetration Testing Guide | - | 2023-05-31 17:23 |
13. Enterprise Risk Management: Threat Awareness Program Plan- | Enterprise Risk Management: Threat Awareness Program Plan | (FREE) | 2023-05-31 17:02 |
Hints- | Hints and tips for SQL query optimization | - | 2023-05-30 16:39 |
Linux troubleshooting- | Linux-Troubleshooting-Scenarios | - | 2023-05-29 15:02 |
AWS ELB- | ELASTIC LOAD BALANCER | - | 2023-05-29 14:55 |
Chef on AWS- | Chef and Amazon Web Services | - | 2023-05-29 14:43 |
Hands-on and troubleshooting- | Ansible hands-on examples and troubleshooting | - | 2023-05-29 14:00 |
Objects- | VIEW, COMMENT, SEQUENSE, SUBQUERY, STORED PROCEDYRE, TRIGGER | - | 2023-05-29 13:43 |
Functions- | String finctions, aggregate, window functions, cte | - | 2023-05-29 10:24 |
Indexing- | Primary key, index, row number, duplicates | - | 2023-05-29 10:07 |
CRUD- | Create, update, alter, insert, merge, delete, drop | - | 2023-05-29 09:39 |
Filters- | WHERE, HAVING, SKIP, TAKE, EXCEPT, EXPLAIN, DESCRIBE, EXISTS | - | 2023-05-29 09:30 |
Operators- | AND, OR, CASE, IN | - | 2023-05-29 09:16 |
ORDER BY- | ORDER BY cheatsheet and tips | - | 2023-05-29 09:02 |
GROUP BY- | GROUP BY cheatsheet | - | 2023-05-29 08:58 |
SELECT- | SELECT cheatcheet | - | 2023-05-29 08:34 |
Data types- | "" | - | 2023-05-29 08:12 |
Terraform Commands - | List of Terraform commands and cheatsheet | - | 2023-05-29 07:53 |
KPI benchmarking guide- | DevOps Setups A Benchmarking Study | - | 2023-05-28 17:55 |
Linux interview dump- | TOP 100 INTERVIEW QUESTIONS & ANSWERS | - | 2023-05-28 16:33 |
Command line cheatsheet- | LINUX COMMAND LINE CHEAT SHEET | - | 2023-05-28 12:14 |
Joining- | JOIN, UNION, RANK | - | 2023-05-28 11:17 |
11. Enterprise Risk Management: Performing Risk Assessments- | Enterprise Risk Management: Performing Risk Assessments | (FREE) | 2023-05-28 11:02 |
HTTP status codes- | Http status code cheatsheet | - | 2023-05-28 10:09 |
SOC Interview Questions vol.2- | Common Interview Questions for SOC Analytic Role | (FREE) | 2023-05-28 09:58 |
PSQL- | PostgreSQL configuration and usage, all commands and debugging | - | 2023-05-28 09:36 |
Quick SQL- | Quick SQL cheat sheet | - | 2023-05-28 09:34 |
MySQL cheatsheet- | MySQL cheat sheet | - | 2023-05-28 09:32 |
Guide- | AWS VPC guide | - | 2023-05-28 09:10 |
Install Elasticsearch 7.x on Ubuntu 22.04- | Install and configuring Elasticsearch 7.x on Ubuntu 22.04 | - | 2023-05-28 07:38 |
DevSecOps in AWS- | Implementing DevSecOps in AWS | (FREE) | 2023-05-27 11:48 |
Install DevOps tools- | Manual how to install and use DevOps tools like Git, Docker, Cheif, Manev, Tomcat, Jenkins, Ansible | - | 2023-05-27 11:03 |
AWS dump 04.2023- | TOP 250+ Interviews Questions on AWS | (FREE) | 2023-05-27 07:39 |
Phishing Attack Prevention- | What is phishing attack and steps to prevent | (FREE) | 2023-05-27 07:30 |
Architecture- | Docker architecture in slides | (FREE) | 2023-05-26 15:01 |
How to DevSecOps - | What is DevSecOps. Integrate Security in Pipeline. Tools of Trade | - | 2023-05-26 14:49 |
DevSecOps pipeline- | How to Build a DevSecOps Pipeline | (FREE) | 2023-05-26 13:39 |
DevOps dump 03.2023- | Ace Your DevOps Interview Guide | - | 2023-05-26 12:43 |
DevOps dump 04.2023- | 200+ DevOps Interview questions and answers | - | 2023-05-26 10:43 |
DevOps Essential concepts- | 100+ DevOps Essential concepts | (FREE) | 2023-05-26 10:41 |
Blue-Green deployment- | How to perform BLUE–GREEN DEPLOYMENTS using only Kubernetes Primitives | (FREE) | 2023-05-26 10:04 |
Compliance- | "" | - | 2023-05-26 09:47 |
File system- | Linux file system cheatsheet | - | 2023-05-26 08:02 |
Let's Encrypt WordPress SSL certificates on Amazon Lightsail- | Using Let’s Encrypt SSL certificates with your WordPress instance in Amazon Lightsail | - | 2023-05-26 07:32 |
API security checklist- | API security best practices from OWASP, NIST, CSA | - | 2023-05-25 16:24 |
Apache Kafka basics- | Apache Kafka terminology, setup and manage Kafka with Python | - | 2023-05-25 15:29 |
Best practices- | Hints, tips and tricks about Ansible configuration and usage. | - | 2023-05-25 14:54 |
Nginx tips- | Hints and tricks | - | 2023-05-25 14:24 |
PostgresSQL cheatsheet- | PostgresSQL commands, view, index and tips | - | 2023-05-21 17:17 |
Site Map- | OpenProdkt WikiPages sitemap | - | 2023-05-21 15:27 |
Git refs- | Git refs guide | - | 2023-05-20 19:39 |
Git hooks- | Git hooks tutorial | - | 2023-05-20 19:29 |
Bitbucket workflows- | Git workflows: forking, gitflow, centralized, feature flow | - | 2023-05-20 18:57 |
Bitbucket using branches- | git checkout, branch, merge, merge conflicts by Bitbucket | - | 2023-05-20 18:26 |
Bitbucket pull request- | Pull request by Bitbucket | - | 2023-05-20 16:02 |
Bitbucket syncing- | git remote, fetch and push by Bitbucket | - | 2023-05-20 14:24 |
Bitbucket rewriting history- | git commit, rebase and reflog by Bitbucket | - | 2023-05-19 13:47 |
Bitbucket undoing changes- | git checkout, clean, revert, reset commands by Bitbucket | - | 2023-05-19 10:53 |
Bitbucket inspecting repo- | git status, tag, blame and log by Bitbucket | - | 2023-05-19 10:18 |
Bitbucket saving changes- | git add, commit, diff, stash commands by Bitbucket | - | 2023-05-19 08:49 |
Bitbucket getting started- | git init, clone, alias, config commands by Bitbucket | - | 2023-05-19 06:26 |
Continuous Delivery/Deployment- | Continuous Delivery and Continuous Deployment in AWS | - | 2023-05-18 15:10 |
Docker & Docker Swarm- | "" | - | 2023-05-18 10:28 |
Kubernetes 05.2023- | "" | - | 2023-05-18 10:26 |
Setup guide- | How to setup and configure Jenkins | - | 2023-05-18 10:22 |
Short notes- | "" | - | 2023-05-17 17:47 |
CI System- | Jenkins Continuous Build System | - | 2023-05-17 17:45 |
YAML HereDoc- | YAML syntax and cheat sheet | - | 2023-05-17 17:22 |
Git cheatsheet- | "" | - | 2023-05-17 15:25 |
Git tips- | Tips and tricks | - | 2023-05-17 15:13 |
Docker commands- | "" | - | 2023-05-17 14:30 |
DevOps dump 06.2023- | "" | - | 2023-05-17 14:15 |
DevOps dump 05.2023- | "" | - | 2023-05-17 13:03 |
CI/CD pipeline setup- | "" | - | 2023-05-17 11:24 |
Ansible basics- | "" | - | 2023-05-17 10:37 |
nmap cheatsheet- | "" | - | 2023-05-17 10:05 |
CompTIA Security+ Questions- | "" | - | 2023-05-16 17:05 |
Kubernetes commands- | "" | - | 2023-05-16 14:17 |
Docker tools- | "" | - | 2023-05-16 13:03 |
Apache HTTP Server- | "" | - | 2023-05-16 12:02 |
MySQL- | "" | - | 2023-05-15 17:02 |
WordPress on AWS Lightsail- | WordPress cheat sheet for AWS Lightsail | - | 2023-05-15 14:43 |
AWS 05.2023- | "" | - | 2023-05-13 20:29 |
HashiCorp Certified: Terraform Associate- | "" | - | 2023-05-13 19:52 |
Kubernetes guide (Google)- | Introduction by Vikram IoT Application Dev | - | 2023-05-12 16:03 |
Ansible Guide- | Full ansible guide from 'IT Automation Simplified' | - | 2023-05-12 15:09 |
Ansible cheatsheet- | "" | - | 2023-05-12 14:57 |
rsync- | "" | - | 2023-05-12 14:53 |
Commands- | "" | - | 2023-05-12 14:21 |
dd- | "" | - | 2023-05-11 16:05 |
user management- | "" | - | 2023-05-11 15:58 |
iptables- | "" | - | 2023-05-11 15:13 |
apt- | "" | - | 2023-05-11 15:04 |
ip- | "" | - | 2023-05-11 14:26 |
signals- | "" | - | 2023-05-11 13:48 |
ssh- | "" | - | 2023-05-10 17:06 |
Cheatsheet- | "" | - | 2023-05-10 08:20 |
chmod- | "" | - | 2023-05-09 16:51 |
regex cheatsheet- | "" | - | 2023-05-09 15:14 |
Linux management tools- | All of linux file management tools | - | 2023-05-09 14:32 |
Kubernetes cheatsheet- | "" | - | 2023-05-09 09:19 |
401/403 Bypass cheatsheet- | "" | - | 2023-05-07 16:10 |
Wireshark commands- | "" | - | 2023-05-07 07:37 |
Operational- | "" | - | 2023-05-06 15:44 |
Policies- | A checklist of best practice and configuration issues | - | 2023-05-06 15:27 |
nuclei cheatsheet- | "" | - | 2023-05-06 09:43 |
Post Exploitation- | "" | - | 2023-05-05 15:37 |
Avoid Detection- | "" | - | 2023-05-05 15:17 |
Exploitation- | "" | - | 2023-05-04 13:13 |
Enumeration- | "" | - | 2023-05-04 11:07 |
Metadata Service IMDS- | "" | - | 2023-05-04 09:48 |
IAM identifiers- | "" | - | 2023-05-04 09:18 |
IAM- | A checklist of best practice and configuration issues | - | 2023-05-04 08:51 |
SQL Injection - HackTricks- | "" | - | 2023-05-03 17:23 |
Plugins- | Pentesting tools, plugins, scripts | - | 2023-05-03 17:09 |
Dig Cheatsheet- | "" | - | 2023-05-03 08:38 |
Enumeration/Privilege Escalation- | "" | - | 2023-05-02 12:09 |
jq- | "" | - | 2023-05-02 11:53 |
Reverse Shell- | "" | - | 2023-05-02 11:16 |
Spawn TTY shell- | "" | - | 2023-05-02 11:10 |
bash- | List of string operations in Linux bash shell | - | 2023-05-02 10:59 |
HTTPS/SSL certificate- | "" | - | 2023-05-01 14:39 |
Policy Hints- | "" | - | 2023-05-01 14:15 |
CLI Hints- | AWS CLI tips and hints by categories | - | 2023-05-01 14:13 |
Install sublime text on Kali Linux- | "" | - | 2023-05-01 14:07 |
Install RTL88x2BU chipset on Kali Linux- | Guide hot to install RTL88x2BU chipset driver on Kali Linux | - | 2023-05-01 14:05 |
Privacy policy- | "" | - | 2023-05-01 13:02 |
Terms and conditions- | "" | - | 2023-05-01 12:59 |
OpenProdkt WikiPages- | OpenProdkt wiki contains only free content or content available under copyleft license ✨️ | - | 2023-05-01 12:50 |