Network Security Channel – Telegram
Network Security Channel
2.55K subscribers
5.33K photos
3.42K videos
5.56K files
4.43K links
شروع از سال 1395
Security Operation Center (SOC)
Bug Bounty
Vulnerability
Pentest
Hardening
Linux
Reasearch
Security Network
Security Researcher
DevSecOps
Blue Team
Red Team
Download Telegram
Hardening
Enhanced Visibility and Hardening Guidance for Communications Infrastructure 2024.:

Network Infrastructure Security Guide, ver.1.2
https://media.defense.gov/2022/Jun/15/2003018261/-1/-1/0/CTR_NSA_NETWORK_INFRASTRUCTURE_SECURITY_GUIDE_20220615.PDF

Cisco Guide to Securing NX-OS Devices
https://sec.cloudapps.cisco.com/security/center/resources/securing_nx_os.html

Cisco IOS XE Hardening Guide, 2024
https://www.cisco.com/c/en/us/support/docs/ios-nx-os-software/ios-xe-16/220270-use-cisco-ios-xe-hardening-guide.html

——————————————————
#CyberSecurity #vCISO #CISA #Hardening
#SecureBusinessContinuity

🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
2👍1🔥1🤩1👨‍💻1
API_Sec_White_Hackers.pdf
35.4 MB
Tech book
API Security for White Hat Hackers: Uncover offensive defense strategies and get up to speed with secure API implementation 2024.

🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
2👍1🔥1👏1😱1🤩1
macsec.pdf
17.7 MB
Research
Unveiling Mac Security:
A Comprehensive Exploration of Sandboxing and AppData TCC 2024.
https://github.com/guluisacat/MySlides/tree/main/BlackHatUSA2024_KCon2024

🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
2🤩2👍1🔥1🎉1
Eth_psw_crack.epub
20.3 MB
Tech book
Ethical Password Cracking:
Decode passwords using John the Ripper, hashcat, and advanced methods for password breaking 2024.

🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
2👍1🔥1😁1😱1🤩1
MD_MZ.pdf
70.4 MB
Techbook
Malware Development:
The result of self-research and investigation of malware development tricks, evasion techniques and persistence 2022.

🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
2🔥1🤩1
DB_Forensics.pdf
13.2 MB
DFIR
Techbook
A Practical Hands-on Approach to Database Forensics.

🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
2🔥1😱1
Cloud_Hacking.pdf
17.7 MB
Techbook
CloudSecurity
Cloud Hacking Playbook 2024.

🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
👏3👍1🔥1😱1🕊1
eBPF_Sec_Model.pdf
1.5 MB
Whitepaper
ThreatResearch
eBPF Security Threat Model 2024.

eBPF Verifier Code Review (.pdf)
https://github.com/ebpffoundation/publications

🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
4👍1🔥1👏1😱1
بیایم از یک الگوریتم داده کاوی data mining برای کمک در شکار تهدیدات استفاده کنیم.

شناخت اوضاع غیر نرمال

https://www.huntandhackett.com/blog/kmeans-clustering-for-lateral-movement-detection

🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
4👍1🔥1😱1🎉1
CleanCode_v2.pdf
30.3 MB
DevOps
Techbook
Seccode review
Clean Code Principles and Patterns: A Software Practitioner’s Handbook",
2nd Edition, 2024.

🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
5👍1🔥1🕊1
Pract_Forensic_IOS_Android.pdf
20.4 MB
DFIR
Tech book
Mobile Security
Practical Forensic Analysis of Artifacts on iOS and Android Devices: Investigating Complex Mobile Devices.

🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
🕊3🔥21🤯1🤩1
LLM_Cybersecurity.pdf
11.8 MB
MLSecOps
Tech book
Large Language Models in Cybersecurity: Threats, Exposure and Mitigation", 2024.

🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
4👍2🎉1🤩1
IDS_IPS_Snort3.pdf
12.3 MB
Tech book
IDS and IPS with Snort 3:
Get up and running with Snort 3 and discover effective solutions to your security issues", 2024.

🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
4👍1😢1🤩1🕊1
FDIA.pdf
1.9 MB
SCADA Security
False Data Injection Attacks Against Distribution Automation Systems", 2024.

🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
👏4🤩2👍1🕊1🤣1
ED_and_RT.pdf
4.5 MB
Whitepaper
Blue Team Techniques
Never Trust, Always Verify: Effectiveness of Endpoint Detection and Response Tools Versus Zero Trust Endpoint Controls in Enterprise Environments", 2024.

🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
🎉42👍1🤩1🕊1
LLM_Sec_Playbook.pdf
2.4 MB
MLSecOps
Tech book
"The Developer’s Playbook for Large Language Model Security: Building Secure AI Applications", 2024.

🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
👍42😢1🤩1🕊1
ML_Security.pdf
10.1 MB
Tech book
"Machine Learning Security Principles:
Keep data, networks, users, and applications safe from prying eyes", 2022.

🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
4👍1🔥1👏1😱1🕊1
سفارت استرالیا تو ایران راننده استخدام میکنه.

تقریبا پیش نیازی نداره به جز زبان.
حقوقش از حدود ۱۱۰ میلیون تومان ماهانه شروع میشه.😑

لینک

🔹 Share & Support Us 🔹
📱 Channel : @Engineer_Computer
Please open Telegram to view this post
VIEW IN TELEGRAM
🗿8🤯3😱3👍1😢1🕊1