maja.sokolowska OfficialNew Edition

The dark side of the DNS or the war of the port 53

From François QUIQUET, Cyber Security Architect on integrated and embedded Systems, publisher on https://www.spacesecurity.info/en/ To follow me: https://www.linkedin.com/in/francoisquiquet/ What is …

May 22,2024

6 min read

Gilbert Oviedo OfficialNew Edition

Reconnaissance - Questions and Answers with Gilbert Oviedo

Can you explain the concept of the reconnaissance phase in the cyber kill chain? Why is it critical to cyber …

Apr 29,2024

6 min read

Peter Chari OfficialNew Edition

Dark Web Reconnaissance: The Art of Uncovering the Hidden Adversaries

Introduction The cyber kill chain is the intelligence-driven defense framework developed by Lockheed Martin. It is a seven-stage model that …

Apr 29,2024

8 min read

Atul TiwariCourse

Kubernetes Ethical Hacking (W75)

Enter a short description of the course.

Apr 25,2024

13 min read

Pranshu Ranakoti OfficialNew Edition

Strategies for Defending Against Kill Chain Reconnaissance

Introduction Recent cyberattacks attributed to advanced persistent threat (APT) groups linked with nation-states have exposed their expanding capabilities when it …

Apr 29,2024

13 min read

maja.sokolowska OfficialNew Edition

The dark side of the DNS or the war of the port 53

From François QUIQUET, Cyber Security Architect on integrated and embedded Systems, publisher on https://www.spacesecurity.info/en/ To follow me: https://www.linkedin.com/in/francoisquiquet/ What is …

May 22,2024

6 min read

Gilbert Oviedo OfficialNew Edition

Reconnaissance - Questions and Answers with Gilbert Oviedo

Can you explain the concept of the reconnaissance phase in the cyber kill chain? Why is it critical to cyber …

Apr 29,2024

6 min read

Peter Chari OfficialNew Edition

Dark Web Reconnaissance: The Art of Uncovering the Hidden Adversaries

Introduction The cyber kill chain is the intelligence-driven defense framework developed by Lockheed Martin. It is a seven-stage model that …

Apr 29,2024

8 min read

Pranshu Ranakoti OfficialNew Edition

Strategies for Defending Against Kill Chain Reconnaissance

Introduction Recent cyberattacks attributed to advanced persistent threat (APT) groups linked with nation-states have exposed their expanding capabilities when it …

Apr 29,2024

13 min read

Atul Tiwari Course

Kubernetes Ethical Hacking (W75)

Enter a short description of the course.

Apr 25,2024

10 min read

Afshan Naqvi Course

AWS Security Essentials: Building a Resilient Cloud Defense (W74)

"AWS Security Essentials: Building a Resilient Cloud Defense" is a concise course that provides essential knowledge and skills to secure your Amazon Web Services (AWS) cloud infrastructure effectively. Learn key security principles and best practices to safeguard your AWS resources and data against threats and vulnerabilities.

Nov 16,2023

12 min read

Rausson Gouveia Course

Create Your Own Command & Control Tool with Golang (W73)

Enter a short description of the course.

Oct 04,2023

6 min read

Kate Libby Course

Kismet Wireless: Network Monitoring and Analysis (W72)

COURSE IS SELF-PACED, AVAILABLE ON DEMAND DURATION: 6 hours CPE POINTS: On completion, you get a certificate granting you 6 …

Sep 14,2023

9 min read

© HAKIN9 MEDIA SP. Z O.O. SP. K. 2023

Watch the rest of this video with a free account.

Already have an account? Sign in

What certifications or qualifications do you hold?
Max. file size: 150 MB.

What level of experience should the ideal candidate have?
What certifications or qualifications are preferred?

Download Free eBook

Step 1 of 4

Name(Required)

We’re committed to your privacy. Hakin9 uses the information you provide to us to contact you about our relevant content, products, and services. You may unsubscribe from these communications at any time. For more information, check out our Privacy Policy.