Application Security – Missed Plots Redefined – BSIMM
How often we develop poorly but try to secure the application at the perimeter level? Is this even possible? Regardless […]
Application Security – Missed Plots Redefined – BSIMM Read Post »
How often we develop poorly but try to secure the application at the perimeter level? Is this even possible? Regardless […]
Application Security – Missed Plots Redefined – BSIMM Read Post »
Install and configure network components, both hardware and software-based, to support organizational security. Firewalls Firewall Types Firewall Rules Application Firewalls
Network Technologies and Tools Read Post »
Install and configure network components,both hardware and software-based, to support organizational security Router Switch Bridge Proxy Load Balancer Firewall NIDS
Network Components Read Post »
A network is a way to get ”stuff” between 2 or more “things” Goal: Basic understanding of common modern networking
What is a Network? Read Post »
The digital world is evolving rapidly, and with it, cyber threats are becoming more sophisticated. Businesses must stay ahead by
Essential Cyber Technologies and Tools for Modern Businesses Read Post »
Process Types Intrusive vs. non-intrusive: See passive vs. active reconnaissance Intrusive: Directly engaging on the target system to identify weaknesses
Vulnerability Scanning Concepts Read Post »
Will discuss Penetration Testing vs Vulnerability Scanning vs Risk Assessment Active reconnaissance Passive reconnaissance Pivot Initial exploitation Persistence Escalation of
Penetration Testing Concepts Read Post »
Explain threat actor type and attributes. And will see hot use Use of Open-Source Intelligence Threat/Threat Actor A potential occurrence
Types of Threat Actors Read Post »
Click-jacking: tricking a web user into clicking a spoofed button or graphic. Session hijacking (Cookie hijacking): exploiting a valid computer
Network and Wireless Attacks Read Post »
Application Attacks Buffer overflow Injection Cross-site scripting (XSS) Cross-site request forgery (CSRF or XSRF) Privilege escalation Search “OWASP top ten”
Threats, Attacks and Vulnerabilities Read Post »