InfoSec Institute Resources

Syndikovat obsah
IT Security Training & Resources by Infosec
Aktualizace: 56 min 50 sek zpět

IPv4 and IPv6 Overview

24 Září, 2020 - 21:42

IP stands for internet protocol. The internet protocol is the protocol which allows internetworking at the internet layer of the internet protocol suite. IPv4 is the fourth version of the protocol and IPv6, as the name implies, is the sixth version. IPv4 IPv4 is the fourth version of IP. It was bought into action by […]

The post IPv4 and IPv6 Overview appeared first on Infosec Resources.

IPv4 and IPv6 Overview was first posted on September 24, 2020 at 2:42 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Top 10 Security Awareness Training Topics for Your Employees [Updated 2020]

24 Září, 2020 - 19:29

An organization’s employees are one of the biggest risks to its cybersecurity. In fact, human error is considered the leading cause of data breaches. However, an organization’s employees can also be a huge asset for an organization’s cybersecurity. If employees are provided with the knowledge they require to identify cyberthreats — through an effective and […]

The post Top 10 Security Awareness Training Topics for Your Employees [Updated 2020] appeared first on Infosec Resources.

Top 10 Security Awareness Training Topics for Your Employees [Updated 2020] was first posted on September 24, 2020 at 12:29 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

DoD 8570 IAT Certification and Requirements [Updated 2020]

24 Září, 2020 - 18:00

Introduction The US Department of Defense (DoD) hosts a number of directives that set out the requirements of their workforce. DoD 8570, titled “Information Assurance Workforce Improvement Program,” describes the expectations of the DoD in terms of required training, certification and management of DoD workforce members carrying out information assurance (IA) duties. The directive is […]

The post DoD 8570 IAT Certification and Requirements [Updated 2020] appeared first on Infosec Resources.

DoD 8570 IAT Certification and Requirements [Updated 2020] was first posted on September 24, 2020 at 11:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

10 Most Popular Password Cracking Tools [Updated 2020]

24 Září, 2020 - 17:22

Passwords are the most commonly used method for user authentication. Passwords are so popular because the logic behind them makes sense to people and they’re relatively easy for developers to implement. However, passwords can also introduce security vulnerabilities. Password crackers are designed to take credential data stolen in a data breach or other hack and […]

The post 10 Most Popular Password Cracking Tools [Updated 2020] appeared first on Infosec Resources.

10 Most Popular Password Cracking Tools [Updated 2020] was first posted on September 24, 2020 at 10:22 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

How to achieve CMMC levels 1 through 5

24 Září, 2020 - 15:05

Introduction: Where the DoD stands on cybersecurity certification The Department of Defense (DoD) has created the Cybersecurity Maturity Model Certification (CMMC) in an effort to secure the Defense Industrial Base (DIB). This was in response to the growing concern that DoD subcontractors cannot always adequately meet the needed cybersecurity standards and best practices for managing […]

The post How to achieve CMMC levels 1 through 5 appeared first on Infosec Resources.

How to achieve CMMC levels 1 through 5 was first posted on September 24, 2020 at 8:05 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

How to verify and respond to vulnerability reports from security researchers

24 Září, 2020 - 15:03

Introduction Part of doing business in today’s increasingly cyber-world is dealing with security vulnerabilities and bugs that come up along the way. Many organizations first learn about a vulnerability or bug by receiving a security vulnerability or security bug report from a security researcher. Those who have not received one of these reports yet, and […]

The post How to verify and respond to vulnerability reports from security researchers appeared first on Infosec Resources.

How to verify and respond to vulnerability reports from security researchers was first posted on September 24, 2020 at 8:03 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Top 10 Penetration Testing Certifications for Security Professionals [Updated 2020]

24 Září, 2020 - 15:02

As more organizations turn to penetration testing for identifying gaps in their defense systems, the demand for skilled penetration testers has been growing. While other types of security practitioners can probe information systems and networks for their vulnerabilities, pentesters are highly specialized, trained to think like hackers when exploiting security weaknesses. CyberSeek (a project of […]

The post Top 10 Penetration Testing Certifications for Security Professionals [Updated 2020] appeared first on Infosec Resources.

Top 10 Penetration Testing Certifications for Security Professionals [Updated 2020] was first posted on September 24, 2020 at 8:02 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Zero-day Sophos XG Firewall vulnerability: An exploit guide for pentesters

24 Září, 2020 - 15:01

The Sophos XG Firewall vulnerability The Sophos XG Firewall recently had a publicly-reported zero-day vulnerability. The vulnerability in question was an SQL injection vulnerability that, if exploited, would allow code execution. This SQL injection vulnerability was reported to the vendor after it was being exploited in the wild. The vendor received a report from a […]

The post Zero-day Sophos XG Firewall vulnerability: An exploit guide for pentesters appeared first on Infosec Resources.

Zero-day Sophos XG Firewall vulnerability: An exploit guide for pentesters was first posted on September 24, 2020 at 8:01 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Understanding DoS attacks and the best free DoS attacking tools [Updated for 2020]

24 Září, 2020 - 14:21

A Denial of Service (DoS) attack is designed to cause service outages. These attacks can easily cost an organization a significant amount in damages and wasted resources, even if the attacker does not demand a ransom to stop the attack. A number of different free DoS tools exist, making it cheap and easy for even […]

The post Understanding DoS attacks and the best free DoS attacking tools [Updated for 2020] appeared first on Infosec Resources.

Understanding DoS attacks and the best free DoS attacking tools [Updated for 2020] was first posted on September 24, 2020 at 7:21 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

PDF File Format: Basic Structure [updated 2020]

24 Září, 2020 - 13:39

Introduction We all know that there are a number of attacks where an attacker includes some shellcode in a PDF document. This shellcode uses some kind of vulnerability in how the PDF document is analyzed and presented to the user to execute malicious code on the targeted system. The following image presents the number of […]

The post PDF File Format: Basic Structure [updated 2020] appeared first on Infosec Resources.

PDF File Format: Basic Structure [updated 2020] was first posted on September 24, 2020 at 6:39 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Popular Tools for Brute-force Attacks [Updated for 2020]

24 Září, 2020 - 09:00

The brute-force attack is still one of the most popular password-cracking methods. Nevertheless, it is not just for password cracking. Brute-force attacks can also be used to discover hidden pages and content in a web application. This attack is basically “a hit and try” until you succeed. This attack sometimes takes longer, but its success […]

The post Popular Tools for Brute-force Attacks [Updated for 2020] appeared first on Infosec Resources.

Popular Tools for Brute-force Attacks [Updated for 2020] was first posted on September 24, 2020 at 2:00 am.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Basics of Secure coding

23 Září, 2020 - 21:09

Introduction: This article provides an overview of secure coding and how it is useful to prevent security vulnerabilities in applications. We will also discuss the benefits of secure coding to understand the value it adds to an organization when used effectively and we will wrap this article by discussing some examples of secure and insecure […]

The post Basics of Secure coding appeared first on Infosec Resources.

Basics of Secure coding was first posted on September 23, 2020 at 2:09 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

IoT Security Fundamentals: Hardware, Software and Radio Security

23 Září, 2020 - 20:52

What is IoT – IoT stands for Internet of Things. The Internet of Things (IoT) is the interconnection and network of various devices formed by connecting any physical device (Vehicle, Tube Light, Thermostat etc) to the internet for sharing and exchanging the data. How does any physical device become capable of getting connected to the […]

The post IoT Security Fundamentals: Hardware, Software and Radio Security appeared first on Infosec Resources.

IoT Security Fundamentals: Hardware, Software and Radio Security was first posted on September 23, 2020 at 1:52 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Using Base64 for Malware Obfuscation

23 Září, 2020 - 20:46

What is Malware – Malware stands for malicious software and software, in simple language, means some program written in any programming language. So if a malicious program is intentionally written to cause damage to any computer or server or gain unauthorized access to any system, it is called malware. What is Obfuscation – Obfuscation is […]

The post Using Base64 for Malware Obfuscation appeared first on Infosec Resources.

Using Base64 for Malware Obfuscation was first posted on September 23, 2020 at 1:46 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

The OSI Model and TCP/IP Model

23 Září, 2020 - 20:36

What is the OSI model? The OSI model was the primary standard model for network communications, adopted by all major telecommunication companies and computers within the early 1980s. The users of a network are located across the world. So, an international group of standards has been developed for ensuring that nationwide and worldwide electronic communication […]

The post The OSI Model and TCP/IP Model appeared first on Infosec Resources.

The OSI Model and TCP/IP Model was first posted on September 23, 2020 at 1:36 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Encryption vs Encoding

23 Září, 2020 - 20:28

Encryption and decryption Encryption is the process of converting plaintext to encrypted text. Since encrypted text cannot be read by anyone, encrypted text hides the original data from unauthorized users. The process entailing encryption and decryption together is called cryptography. The unencrypted data is called plaintext, while the encrypted data is called ciphertext. The algorithms […]

The post Encryption vs Encoding appeared first on Infosec Resources.

Encryption vs Encoding was first posted on September 23, 2020 at 1:28 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Endpoint Hardening (best practices)

23 Září, 2020 - 20:15

Introduction Endpoint hardening: If you were to tell the average person that you were going to be performing this task for your organization, they’d probably ask if you were a blacksmith. However, in this case, we’re going to talk about creating defenses for our systems instead of offenses.  Endpoints are everywhere now: mobiles, laptops, toasters, […]

The post Endpoint Hardening (best practices) appeared first on Infosec Resources.

Endpoint Hardening (best practices) was first posted on September 23, 2020 at 1:15 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Deepfake

23 Září, 2020 - 20:01

Introduction “Deepfake” isn’t a new type of beauty cream, an underwater virtual tour or even a sternly worded insult. It is in fact, the culmination of decades worth of audio and video editing methods combined with cutting-edge artificial intelligence and machine learning.  Despite the fact that most people have come across it on YouTube, Facebook […]

The post Deepfake appeared first on Infosec Resources.

Deepfake was first posted on September 23, 2020 at 1:01 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Blockchain: Beyond the Basics

23 Září, 2020 - 19:43

Beyond the basic blockchain The core blockchain protocol implements a distributed ledger capable of performing cryptocurrency transfers. Smart contract platforms add additional functionality by running programs on top of the blockchain. However, distributed ledger technology is not limited to the traditional blockchain or smart contract platform. Distributed ledgers can run on alternative architectures, support second-layer […]

The post Blockchain: Beyond the Basics appeared first on Infosec Resources.

Blockchain: Beyond the Basics was first posted on September 23, 2020 at 12:43 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security

Mobile Device Management

23 Září, 2020 - 19:33

Introduction “Hey Buddy, can you make it so my phone can get work email please?”  “Oh sure, no problem.”  “Thanks.  Also I’ll need my laptop, tablet, smartwatch, A/R goggles, car and refrigerator all set up as well please.  Oh and I’ll need it done before I leave on a work trip in the next 20 […]

The post Mobile Device Management appeared first on Infosec Resources.

Mobile Device Management was first posted on September 23, 2020 at 12:33 pm.
©2017 "InfoSec Resources". Use of this feed is for personal non-commercial use only. If you are not reading this article in your feed reader, then the site is guilty of copyright infringement. Please contact me at darren.dalasta@infosecinstitute.com
Kategorie: Hacking & Security