CyberSecurity & AI Experts – Telegram
CyberSecurity & AI Experts
40.4K subscribers
313 photos
378 files
296 links
🔰 Ethical Hacking and Cyber Security Official Telegram Channel
🔰 Free content to learn Hacking & AI

For promotions: @coderfun
Download Telegram
linux_mastery.pdf
1.4 MB
Linux Mastery
100+ Exercises for building your skills
4👍2
Mastering_Go_Network_Automation.pdf
4.3 MB
Mastering Go Network Automation: Automating Networks, Container Orchestration, Kubernetes with Puppet, Vegeta and Apache JMeter (2023)
👍6
Linux Command Cheat Sheet
👍72
➡️ Scanning Techniques ➡️

Scanning refers to the process of actively searching for vulnerabilities in a target system or network in order to identify potential points of entry for an attacker. There are various scanning techniques that ethical hackers use to accomplish this task.

📌Port Scanning: Port scanning involves scanning all the open ports on a target system or network. This technique is used to identify potential entry points for attackers.

📌Network Scanning: This scanning technique involves identifying all the devices that are connected to a network. It helps in identifying the potential vulnerabilities that can be exploited by hackers to gain unauthorized access.

📌Vulnerability Scanning: Vulnerability scanning helps in identifying the vulnerabilities in the system or network. This technique involves scanning the entire system or network to identify potential vulnerabilities that could be exploited by attackers.

📌Web Application Scanning: This technique is used to identify vulnerabilities in web applications. It involves scanning the web application to identify vulnerabilities such as SQL injection, cross-site noscripting, etc.

📌Wireless Scanning: Wireless scanning is used to identify wireless networks and connected devices that could be potential entry points for attackers. It includes identifying the security protocols used by the wireless network, strength of the Wi-Fi signal, etc.

📌Malware Scanning: Malware scanning involves scanning the system or network for malware infections. It helps in identifying potential threats and protecting the system from malicious attacks.
8👍2
gordon-fyodor-lyon-nmap-network-scanning-the-official.pdf
120.1 MB
Nmap Network Scanning
Gordon Fyodor Lyon, 2009
(scanned pdf)
Recommendation Engines - Michael Schrage - 2020.pdf
8.6 MB
Recommendation Engines
Michael Schrage, 2020
👍1
Computer Language Engineering (SMA 5502)

It is a course within the department’s “Computer Systems and Architecture” concentration. This course analyzes issues associated with the implementation of high-level programming languages. Topics covered include: fundamental concepts, functions, and structures of compilers, basic program optimization techniques, the interaction of theory and practice, and using tools in building software. The course features a multi-person project on design and implementation of a compiler that is written in Java® and generates MIPS executable machine code. This course is worth 8 Engineering Design Points.

🆓 Free Online Course
💻 Lecture Videos
📶 Readings
☢️ Projects
🏃‍♂️ Self paced
Teacher 👨‍🏫 : Prof. Martin Rinard, Prof. Saman Amarasinghe

Source: MIT

🔗 Course Link
👍6🥰1👏1