Network Security Channel – Telegram
Network Security Channel
2.55K subscribers
5.33K photos
3.42K videos
5.56K files
4.44K links
شروع از سال 1395
Security Operation Center (SOC)
Bug Bounty
Vulnerability
Pentest
Hardening
Linux
Reasearch
Security Network
Security Researcher
DevSecOps
Blue Team
Red Team
Download Telegram
AMH.pdf
49.8 MB
Tech book
Mobile Security
Malware analysis
The Android Malware Handbook:
Detection and Analysis by Human and Machine 2024.
@Engineer_Computer
مملکت «حسین قلی خانی» چیست؟

*حسین‌ قلی‌خان مخبرالدوله، وزیر پست و تلگراف مظفرالدین شاه بود که برای جلوگیری از ارتباط مشروطه‌ خواهان و مردم باهم، تمام سیم‌های تلگراف تهران را قطع کرد!*
*و این اولین سابقه فیلترینگ در ایران بوده که بنا بر همین اتفاق این بساطی که او چیده بود مشهور شد به ضرب المثل معروف مملکت «حسین قلی خانی».

#پوفیوز_تاریخ
#history
@Engineer_Computer
3😁1
Journeyman Cybersecurity Analyst
CA-Oxnard, We are seeking a Building Automations Analyst (Journeyman) Clearance: Secret Location: Pt. Hueneme, Ventura County Schedule: Onsite in Pt. Hueneme, with flexibility based on mission support requirements LCAT Level: Journeyman IT Analyst Position Denoscription The Defensive Cyber team is responsible for the analysis of all technology devices which may include Operational Technology (OT) and Industria

http://jobview.monster.com/Journeyman-Cybersecurity-Analyst-Job-Oxnard-CA-US-277513156.aspx

@Engineer_Computer
#US #Journeyman Cybersecurity Analyst
🔒 Discover how browser security platforms help CISOs cut costs, boost efficiency, and enhance cybersecurity.
Read real-life success stories:
https://thehackernews.com/2024/06/how-to-cut-costs-with-browser-security.html

@Engineer_Computer
یک منبع خوب برای علاقمندان فارنزیک حافظه

حافظه جولانگاه بدافزارها و نفوذگران است. هم محلی برای مچ گیری ایشان هست در هنگام نفوذ هم محلی مناسب است برای رد گیری پس از نفوذ.

https://github.com/digitalisx/awesome-memory-forensics

@Engineer_Computer
👍2
🔥 CyberOps Associate

Prove your expertise in essential cybersecurity skills, concepts, and technologies, including security monitoring, analysis, and response. Launch your career in cyber operations with the Cisco Certified CyberOps Associate certification.

🚩Security concepts
🚩Security monitoring
🚩Host-based analysis
🚩Network intrusion analysis

Size :- 13.32 GB

Download link :  https://mega.nz/folder/BuVETIbQ#iKm2iCpCq4JUFyVfe3oeag

@Engineer_Computer
🤩1
🔥 USB Forensics and Pentesting

This course will cover USB in detail with an emphasis on understanding USB Mass Storage devices (also known as flash drives or thumb drives).By the end of this course students will know how to sniff USB traffic using open source tools, be able to write-block USB mass storage devices using software and microcontroller-based hardware, be able to impersonate other USB devices, and understand how to make forensic duplicates of USB mass storage devices.  Along the way students will also learn how to use microcontrollers and Udev rules.

L!NK: https://mega.nz/folder/ZuMElYwB#MUqOT97hwSAyz52jYHeGzg

Note :- Open ZIP files on RDP or Virtual machine

@Engineer_Computer
👍1🔥1