Sistema de blogs Diarium
Universidad de Salamanca
Pablo Gallardo's Blog
My professional web log about IT, Cybersecurity & Project Management
 
Tag Archives | cybersecurity

List of Network Scanning Tools

List of network scanning tools: nmap hping3 NetScanTools Pro Advanced Port Scanner SuperScan PRTG Network Monitor OmniPeek MiTeC Network Scanner NEWT Professional MegaPing Slitheris Network Discovery TamoSoft’s CommView IP Scanner IP-Tools Network Scanner Global Network Inventory SoftPerfect Network Scanner CurrPorts Masscan DRACNMAP NEET Most common are nmap, hping3, NetScanTools Pro and Advanced Port Scanner.   […]

Comments { 0 }

Types of Clouds

Private Cloud: A private cloud, also known as internal or corporate cloud, is a cloud infrastructure that a single organization operates solely. The organization can implement the private cloud within a corporate firewall. Organizations deploy private cloud infrastructures to retain full control over corporate data. Public Cloud: In this model, the provider makes services such […]

Comments { 0 }

Types of Wi-Fi Connections

Encryption algorithms: RC4 AES Encryption protocols: Temporal Key Integration Protocol (TKIP) Cipher-block Chaining Message authentication Protocol (CCMP) Wi-Fi security modes: WEP WPA WPA2 Authentication options supported by WPA, WPA2 and WPA3: Preshared key (PSK) or personal (PER) IEEE 802.1X or enterprise (ENT)router connection PSK is the use of a static fixed password or authentication. ENT […]

Comments { 0 }

Public Vulnerability Databases

List of Vulnerability Databases Exploit Database https://www.exploit-db.org   CVE https://cve.mitre.org/ Security Focus http://www.securityfocus.com NDV Database https://ndv.nist.org Open Source Vulnerability Database (OSVDB) http://www.osvdb.org Now defunct.

Comments { 0 }

Cybersecurity Attack Phases

According to EC-Council EC-Council identify in the CEH course 5 hacking phases: Reconnaissance Scanning Gaining Access Maintaining Access Clearing Tracks According to ISACA ISACA identify 8 phases in a cybersecurity generalized attack processs: Perform reconnaissance Create attack tools Deliver malicious capabilities Exploit and compromise Conduct an attack Achieve results Maintain a presence or set of […]

Comments { 0 }

How to get Certified Ethical Hacker (CEH) Certification

Certified Ethical Hacker (CEH) program is a set of certifications provided by EC-Council and related to cybersecurity. CEH is a certificate that appears in most of the professional certification paths suggested by EC-Council, so it can be considered a core module on Cybersecurity among all the ones offered by EC-Council. Based on my personal experience, […]

Comments { 0 }

ISACA Cybersecurity Nexus

Cybersecurity Nexus (CSX) is a training and credentialing program related to cybersecurity and develop by the professional association ISACA. It consists of a series of certificates: CSX Fundamentals (CSX-F) Certificate CSX Foundations Certificate, is awarded automatically when the candidate achieves: CSX Network Application and Configuration Certificate CSX Linux Application and Configuration Certificate CSX Packet Analysis […]

Comments { 0 }

How to pass Cybersecurity Fundamentals CSX-F Certificate

CSX-F, acronym of Cybersecurity Fundamentals, was a certificate issued by professional association ISACA that demonstrates knowledge on cybersecurity. It was the entry-level exam for ISACA’s Cybersecurity Nexus (CSX) certificate series. Important note: As of 2022, it seems that CSX-F certificate has been superseded by ITCA Cybersecurity Fundamentals Certificate. CSX-P (Cybersecurity Nexus Practitioner) is an advanced-level […]

Comments { 2 }

Common Cybersecurity Attacks

Non-exhaustive list of common Cybersecurity Attacks: Brute-force Attack Cross-Site Request Forgery (XSRF) Cross-Site Scripting (XSS) Denial of Service (DoS) Man-in-the-middle (MITM) Rogue access point Session hijacking Spoofing of data packets SQL Injection   Detailed List Brute-force Attack A brute-force attack (a.k.a. brute force cracking) is the cyberattack equivalent of trying every key on your key […]

Comments { 0 }
Política de privacidad
Studii Salmantini. Campus de excelencia internacional