Skip to main content

Ethical Hacking

CISSP

CISSP is a popular cyber security certification. Risk Management, Security Architecture, Network Security, Identity & Access Management, SecOps, and more

https://www.freecodecamp.org/news/get-ready-to-pass-cissp-exam

White Hat hackers

A white hat hacker is an individual who uses hacking skills to identify security vulnerabilities in hardware, software or networks. However, unlike black hat hackers, white hat hackers respect the rule of law as it applies to hacking.

Gray Hat Hackers

Gray hat hackers fall between white and black hats on the moral spectrum. Gray hats generally consider themselves good guys who are more flexible about the rules under which they operate. For example, a gray hat hacker may be more likely than a white hat hacker to access systems without getting permission or authorization from the owners, but would be less likely than a black hat hacker to cause damage to those systems. While not typically motivated by financial gain, gray hat hackers may try to get the owners of a system they've hacked to pay them to patch or fix those systems.

Black Hat Hackers

A black hat hacker has no qualms about selling vulnerabilities and exploits to the highest bidder, such as a criminal organization, usually for the purpose of exploiting them. Black hat hackers are willing to break the law to discover, create and use security flaws maliciously for personal gain or to make a political statement.

Websites

Tools

Digital Forensics

image

image

image

SOLUTIONSPARTNERS/OEM's
Cloud Security(WAF, NGFW), Email Security, FirewallCisco/ PaloAlto/Fortinet/Sophos/Barracuda
DLPForcepoint, Cososys, Netskope
End PointSophos, TrendMicro, Crowdstrike, FireEye
CollaborationCisco/ Polycom
Enterprise NetworkingCisco/Hpe
Network Access ControlCisco ISE, FortiNac
MultiFactor AuthenticationCisco Duo, RSA
Back up SolutionsVeeam
Web SecurityNetSkope, Forcepoint
Micro SegmentationCisco Teteration, Color Token
Storage SolutionsDell, Netapp
Inventory& Ticketing ToolMotadata, Sapphire IMS
Vulnerability AssessmentTenable, Holmsecurity
Network Monitoring ToolMotadata, Whatsup Gold, Solarwinds
Performance Monitoring & AnalyticsAcreedian
Load Balancing & WAFF5, Array Networks
SD-WANCisco Viptela, CATO Networks
CASBNetskope, Forcepoint, Paloalto
MDMVmware, SOTI, Citrix, Meraki
Structured CablingBelden, Siemon, Saffron Networks

Master data management (MDM)

Master data management (MDM) is a technology-enabled discipline in which business and IT work together to ensure the uniformity, accuracy, stewardship, semantic consistency and accountability of the enterprise's official shared master data assets. Master data is the consistent and uniform set of identifiers and extended attributes that describes the core entities of the enterprise including customers, prospects, citizens, suppliers, sites, hierarchies and chart of accounts.

Bug bounty

Hacks