Quantcast
Channel: Joas Antonio archivos - CISO2CISO.COM & CYBER SECURITY GROUP
Browsing all 10 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Cybersecurity for Kids 1 by Joas Antonio

La entrada Cybersecurity for Kids 1 by Joas Antonio se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

View Article



Image may be NSFW.
Clik here to view.

Cybersecurity for Kids 2 by Joas Antonio

This document was made for parents, teachers, teenagers and children with basic computer skills or who want to learn more about cybersecurity Intended for children from 10 years of age. La entrada...

View Article

Image may be NSFW.
Clik here to view.

Guide for Multi-Cloud Read Team AWS – GCP – AZURE by Joas Antonio

La entrada Guide for Multi-Cloud Read Team AWS – GCP – AZURE by Joas Antonio se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

View Article

Image may be NSFW.
Clik here to view.

Phyton for Red Teams & Hackers by Joas Antonio

PDF in order to show codes that can be used in your daily life or enhanced for some function, all credits will be left.https://www.linkedin.com/in/joas-antonio-dos-santos La entrada Phyton for Red...

View Article

Image may be NSFW.
Clik here to view.

Threat Hunting Introduction by Joas Antonio

What is Threat Hunting? – A successful threat hunting program is based on an environment’s data fertility. In other words, anorganization must first have an enterprise security system in place,...

View Article


Image may be NSFW.
Clik here to view.

100 Security Operation Tools for SOCs by Joas Antonio

A very good selection of cybersecurity tools to be used in a SOCs. La entrada 100 Security Operation Tools for SOCs by Joas Antonio se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

View Article

Image may be NSFW.
Clik here to view.

Windows Persistence Techniques by Joas Antonio

La entrada Windows Persistence Techniques by Joas Antonio se publicó primero en CISO2CISO.COM & CYBER SECURITY GROUP.

View Article

Image may be NSFW.
Clik here to view.

Security Operation Center Operations Development

The process of developing and refining Security Operation Center (SOC) Operations is a multifaceted endeavor that hinges upon the strategic incorporation of a diverse array of specialized tools and...

View Article


Image may be NSFW.
Clik here to view.

Security Operations Center (SOC) – Tools for Operations Development by Joas...

Download & read the complete guide below 👇👇👇 La entrada Security Operations Center (SOC) – Tools for Operations Development by Joas Antonio se publicó primero en CISO2CISO.COM & CYBER SECURITY...

View Article


Image may be NSFW.
Clik here to view.

Ransomware Investigation osint and hunting Overview PT1

What is Ransomware? Ransomware is malware that employs encryption to hold a victim’s information at ransom. A user or organization’s critical data is encrypted so that they cannot access files,...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images