• 🌙 Community Spirit

    Ramadan Mubarak! To honor this month, Crax has paused NSFW categories. Wishing you peace and growth!

IT & Software IT Security Hacking and Networks Security – 2020 (1 Viewer)

Currently reading:
 IT & Software IT Security Hacking and Networks Security – 2020 (1 Viewer)

Covers web development, programming, AI, cloud computing, DevOps, and cybersecurity.
Recently searched:

protectaccount

Member
Amateur
LV
3
Joined
Nov 21, 2025
Threads
589
Likes
56
Awards
8
Credits
13,533©
Cash
0$

28cdea35455cb8fd47f8b595f969eeeb.jpg

This course sums up more than 10 years working on IT and the content of a master degree in information technologies security.

The topics are:



CIA triad, types of attacks and security mechanisms
Security concepts and methodologies (Terminology, Security properties and case study of a Risk Management plan)
Cryptography (Introduction, Historical background, principles and how to stay anonymous on the Internet)
Security benchmark (Black-box and white-box approach to exploit and secure a system)
Formulary hacks (Code a vulnerable form, exploit and secure it)
Security in email (PGP) and web servers (X.509)
Network firewall with Snort integration
Remote security analysis and assessment
Build a dedicated virtual server (Backup your data, including Time Machine, run your Virtual Machines among other perks)


Extra chapters about web server sandboxes and the Wannacry ransomware, will be updated as I see fit our you demand.


Even if you are already a system administrator or a newbie you are most likely to find something new, as I did previously to start this.



This course is constantly reviewed and updated with new lessons.

More information available at hackademy.tech



What you’ll learn:



Have a comprehensive insight regarding information technologies security
Security concepts and methodologies (Terminology, Security properties and case study of a Risk Management plan)
Cryptography (Introduction, Historical background, principles and how to stay anonymous on the Internet)
Security benchmark (Black-box and white-box approach to exploit and secure a system)
Formulary hacks (Code a vulnerable form, exploit and secure it)
Build a dedicated virtual server (Backup your data, including Time Machine, run your Virtual Machines among other perks)
Extra chapters about web server sandboxes and the Wannacry ransomware, will be updated as I see fit our you demand.



Who this course is for:



From the newbie to the more experienced system administrator you most likely will learn something


Link:
 

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Recently searched:

Similar threads

Users who are viewing this thread

Top Bottom