Курсы ведущих вузов России для каждого без ограничений - бесплатно, на любой вкус
https://openedu.ru/
#education
https://openedu.ru/
#education
👍7🤔4😱1🤩1
Обзор рынка труда и заработных плат в РФ от агентства Hays - 2022
В исследовании, проведённом международной рекрутинговой компанией Hays в России, приняли участие 4896 респондентов: 2595 нанимающих менеджеров и 2301 сотрудник из России и стран СНГ. Они рассказали о вызовах, с которыми им пришлось столкнуться в прошедшем году - это и текучесть персонала, и кадровый дефицит,
и завышенные зарплатные ожидания соискателей, и жёсткая конкурентная среда, и поделились подходами к борьбе с текущими трудностями, а также своими ожиданиями и планами на следующий год.
Источник
https://www.econ.msu.ru/students/eas/infost/researches/News.20220217162712_3325/
PDF
https://www.econ.msu.ru/sys/raw.php?o=82822&p=attachment
#analytics
В исследовании, проведённом международной рекрутинговой компанией Hays в России, приняли участие 4896 респондентов: 2595 нанимающих менеджеров и 2301 сотрудник из России и стран СНГ. Они рассказали о вызовах, с которыми им пришлось столкнуться в прошедшем году - это и текучесть персонала, и кадровый дефицит,
и завышенные зарплатные ожидания соискателей, и жёсткая конкурентная среда, и поделились подходами к борьбе с текущими трудностями, а также своими ожиданиями и планами на следующий год.
Источник
https://www.econ.msu.ru/students/eas/infost/researches/News.20220217162712_3325/
https://www.econ.msu.ru/sys/raw.php?o=82822&p=attachment
#analytics
👍8👏2
Скрытая угроза: как проверить кандидата при трудоустройстве
В прошлой публикации мы упомянули тревожные случаи в IT-сообществе: угрозы безопасности, исходящие не от хакеров, а от сотрудников изнутри. Что можно предпринять? Мы проконсультировались с юристом и подготовили рекомендации.
Источник
https://vc.ru/s/1209822-express-42/467028-skrytaya-ugroza-kak-proverit-kandidata-pri-trudoustroystve
#job
В прошлой публикации мы упомянули тревожные случаи в IT-сообществе: угрозы безопасности, исходящие не от хакеров, а от сотрудников изнутри. Что можно предпринять? Мы проконсультировались с юристом и подготовили рекомендации.
Источник
https://vc.ru/s/1209822-express-42/467028-skrytaya-ugroza-kak-proverit-kandidata-pri-trudoustroystve
#job
👍7❤2
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities by Vickie Li, 2021
You'll start by learning how to choose a program, write quality bug reports, and maintain professional relationships in the industry. Then you'll learn how to set up a web hacking lab and use a proxy to capture traffic. In Part 3 of the book, you'll explore the mechanisms of common web vulnerabilities, like XSS, SQL injection, and template injection, and receive detailed advice on how to find them and bypass common protections. You'll also learn how to chain multiple bugs to maximize the impact of your vulnerabilities.
Finally, the book touches on advanced techniques rarely covered in introductory hacking books but that are crucial to understand to hack web applications. You'll learn how to hack mobile apps, review an application's source code for security issues, find vulnerabilities in APIs, and automate your hacking process.
#book
You'll start by learning how to choose a program, write quality bug reports, and maintain professional relationships in the industry. Then you'll learn how to set up a web hacking lab and use a proxy to capture traffic. In Part 3 of the book, you'll explore the mechanisms of common web vulnerabilities, like XSS, SQL injection, and template injection, and receive detailed advice on how to find them and bypass common protections. You'll also learn how to chain multiple bugs to maximize the impact of your vulnerabilities.
Finally, the book touches on advanced techniques rarely covered in introductory hacking books but that are crucial to understand to hack web applications. You'll learn how to hack mobile apps, review an application's source code for security issues, find vulnerabilities in APIs, and automate your hacking process.
#book
👍6
Bug_Bounty_Bootcamp_The_Guide_to_Finding_and_Reporting_Web_Vulnerabilities.pdf
10.3 MB
Bug Bounty Bootcamp: The Guide to Finding and Reporting Web Vulnerabilities by Vickie Li, 2021
👍2
Introduction to Azure Penetration Testing - free online Lab
Source
https://azure.enterprisesecurity.io/
#pentest
Source
https://azure.enterprisesecurity.io/
#pentest
👍4
Баг Баунти PlayBook, перевод Timcore, 2022
Источник
https://timcore.ru/tag/bag-baunti/
Хабр
https://habr.com/ru/company/otus/blog/480822/
#book
Источник
https://timcore.ru/tag/bag-baunti/
Хабр
https://habr.com/ru/company/otus/blog/480822/
#book
🔥7
Курс наполнен практикой и теорией от этичных хакеров. Osint, тестирование на проникновение, метод оценки безопасности компьютерных систем или сетей средствами моделирования атаки злоумышленника, места для практики и любимые игры хакера.
Источник
https://news.1rj.ru/str/+Bbeg4pYUO99lOTBi
#newbie
Источник
https://news.1rj.ru/str/+Bbeg4pYUO99lOTBi
#newbie
🔥13
RTFM: Red Team Field Manual v2 ( July 11, 2022) by Ben Clark, Nick Downer
Over 8 years ago, the Red Team Field Manual (RTFM) was born out of operator field notes inspired by years of Red Team missions. While tools and techniques change, operators still constantly find themselves in common operating environments, with time running out. The RTFM has provided a quick reference when there is no time to scour the Internet for that perfect command.
RTFM version 2 has been completely overhauled, with the addition of over 290 new commands and techniques. It has also been thoroughly updated and tested to ensure it works against modern operating systems. Version 2 includes a new Mac OS section and a section outlining tradecraft considerations.
Предыдущий пост
https://news.1rj.ru/str/w2hack/1642
#book
Over 8 years ago, the Red Team Field Manual (RTFM) was born out of operator field notes inspired by years of Red Team missions. While tools and techniques change, operators still constantly find themselves in common operating environments, with time running out. The RTFM has provided a quick reference when there is no time to scour the Internet for that perfect command.
RTFM version 2 has been completely overhauled, with the addition of over 290 new commands and techniques. It has also been thoroughly updated and tested to ensure it works against modern operating systems. Version 2 includes a new Mac OS section and a section outlining tradecraft considerations.
Предыдущий пост
https://news.1rj.ru/str/w2hack/1642
#book
👍8
RTFM - Red Team Field Manual v2.epub
247.4 KB
RTFM: Red Team Field Manual v2 ( July 11, 2022) by Ben Clark, Nick Downer
👍1
scan4all
Vulnerabilities Scan: 15000+PoCs; 20 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty
GitHub
https://github.com/hktalent/scan4all
Vulnerabilities Scan: 15000+PoCs; 20 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules Port scanning; Fuzz, HW, awesome BugBounty
GitHub
https://github.com/hktalent/scan4all
👍4
Hack the Cybersecurity Interview. A complete interview preparation guide for jumpstarting your cybersecurity career by Ken Underhill, Christophe Foulon, Tia Hopkins, 2022
This book is a comprehensive guide that helps both entry-level and experienced cybersecurity professionals prepare for interviews in a wide variety of career areas.
Complete with the authors' answers to different cybersecurity interview questions, this easy-to-follow and actionable book will help you get ready and be confident. You'll learn how to prepare and form a winning strategy for job interviews. In addition to this, you'll also understand the most common technical and behavioral interview questions, learning from real cybersecurity professionals and executives with years of industry experience.
By the end of this book, you'll be able to apply the knowledge you've gained to confidently pass your next job interview and achieve success on your cybersecurity career path.
#book #job #softskill #world
This book is a comprehensive guide that helps both entry-level and experienced cybersecurity professionals prepare for interviews in a wide variety of career areas.
Complete with the authors' answers to different cybersecurity interview questions, this easy-to-follow and actionable book will help you get ready and be confident. You'll learn how to prepare and form a winning strategy for job interviews. In addition to this, you'll also understand the most common technical and behavioral interview questions, learning from real cybersecurity professionals and executives with years of industry experience.
By the end of this book, you'll be able to apply the knowledge you've gained to confidently pass your next job interview and achieve success on your cybersecurity career path.
#book #job #softskill #world
👍6