Cybersecurity for Kids 1 by Joas Antonio
La entrada Cybersecurity for Kids 1 by Joas Antonio se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
View ArticleCybersecurity for Kids 2 by Joas Antonio
This document was made for parents, teachers, teenagers and children with basic computer skills or who want to learn more about cybersecurity Intended for children from 10 years of age. La entrada...
View ArticleGuide for Multi-Cloud Read Team AWS – GCP – AZURE by Joas Antonio
La entrada Guide for Multi-Cloud Read Team AWS – GCP – AZURE by Joas Antonio se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
View ArticlePhyton for Red Teams & Hackers by Joas Antonio
PDF in order to show codes that can be used in your daily life or enhanced for some function, all credits will be left.https://www.linkedin.com/in/joas-antonio-dos-santos La entrada Phyton for Red...
View ArticleThreat Hunting Introduction by Joas Antonio
What is Threat Hunting? – A successful threat hunting program is based on an environment’s data fertility. In other words, anorganization must first have an enterprise security system in place,...
View Article100 Security Operation Tools for SOCs by Joas Antonio
A very good selection of cybersecurity tools to be used in a SOCs. La entrada 100 Security Operation Tools for SOCs by Joas Antonio se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
View ArticleWindows Persistence Techniques by Joas Antonio
La entrada Windows Persistence Techniques by Joas Antonio se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.
View ArticleSecurity Operation Center Operations Development
The process of developing and refining Security Operation Center (SOC) Operations is a multifaceted endeavor that hinges upon the strategic incorporation of a diverse array of specialized tools and...
View ArticleSecurity Operations Center (SOC) – Tools for Operations Development by Joas...
Download & read the complete guide below 👇👇👇 La entrada Security Operations Center (SOC) – Tools for Operations Development by Joas Antonio se publicó primero en CISO2CISO.COM & CYBER SECURITY...
View ArticleRansomware Investigation osint and hunting Overview PT1
What is Ransomware? Ransomware is malware that employs encryption to hold a victim’s information at ransom. A user or organization’s critical data is encrypted so that they cannot access files,...
View Article
More Pages to Explore .....