Wireshark Metasploit Nessus Aircrack Snort Cain and Abel BackTrack Netcat tcpdump John the Ripper Kismet OpenSSH/PuTTY/SSH Burp Suite Nikto Hping Ettercap Sysinternals w3af OpenVAS Scapy Source: sectools.org
IT Security
10 Best Computer Networking Books for Beginners & Experts
10 Best IT Security Books for Beginners & Experts
10 Best Ethical Hacking Books for Beginners & Experts
10 Best Cloud Security Books for Beginners & Experts
10 Best OT, ICS, SCADA Security Books for Beginners & Experts
10 Best Web Security Books for Beginners & Experts
10 Best Cryptocurrency Books for Beginners & Experts
The Best Password Managers to Secure Your Digital Life
USB Sticks with Built-in PIN Keypad
How To Prepare for CEH and OSCP Exam – Books & Courses
How To Prepare for CISA, CISM and CRISC Exam – Books & Courses
Top 20 Network Security Tools
List of Proxies (HTTP/S, SOCKS4/5 & Rotating)
HTTP/S, SOCKS4/5 rainproxy.io proxiware.com intenseproxy.com truesocks.net proxyscrape.com Rotating Proxy smartproxy.com zenscrape.com stormproxies.com luminati.io netnut.io oxylabs.io geosurf.com
OT Security Certifications (GICSP, GRID, GCIP)
Global Industrial Cyber Security Professional (GICSP) The GICSP bridges together IT, engineering and cyber security to achieve security for industrial control systems from design through retirement. This unique vendor-neutral, practitioner focused industrial control system certification is a collaborative effort between GIAC and representatives from a global industry consortium involving organizations that design, deploy, operate and/or […]
Top 5 WordPress Security Plugins
Network Switch – Layer 2 Security Controls
Secure Shell Protocol (SSH): SSH to secure incoming/outgoing Telnet connections; support of SSHv1 and v2 Secure Sockets Layer (SSL): SSL to encrypt HTTP connections; advanced security for browser-based configuration via web interface IEEE 802.1X: IEEE 802.1X access control on all ports; RADIUS for authentication, authorization and accounting with MD5 hashing; guest VLAN; dynamic VLAN assignment […]
VPN Providers that Accept Cryptocurreny
Introduction to Operational Technology Security (OTSEC)
How To Secure Linux, Nginx, MariaDB, PHP (LEMP stack) on Debian
IT Security Online Courses for Beginners and Professionals
How To Prepare for Certified Information Systems Security Professional (CISSP) Exam – Books & Courses
Online Courses CISSP Complete Video Course by Sari Greene CISSP Complete Video Course by Sari Greene contains 24 hours of training with content divided into 9 lessons with 94 video sub-lessons. The videos consist of live trainer discussions, screencasts, animations, and live demos. The video lessons in this course review each exam objective so you […]
OSI Model: Data Link and Network Layer Security Controls
Intrusion Prevention: Monitoring and blocking of login attempts and port scans IP Spoofing: Source IP address check on all interfaces: only IP addresses belonging to the defined IP networks are allowed Access control lists (ACLs): Filtering of IP or MAC addresses and preset protocols for configuration access and LANCAPI Denial of Service protection: Protection from […]
How to Secure Your WordPress Website From Hackers
Plugins
How to Stay Anonymous Online
You can not stay totally anonymous online but you can try to hide your traces.
Best VPN Service Provider
https://amiunique.org/ expressvpn.com privateinternetaccess.com nordvpn.com ProtonVPN Doublehop BlackVPN BolehVPN Trust.Zone NordVPN
Intrusion Detection and Prevention Systems (HIDS, HIDP, NIDS, NIDP)
Classification Network-based intrusion prevention system (NIPS): monitors the entire network for suspicious traffic by analyzing protocol activity. Wireless intrusion prevention system (WIPS): monitor a wireless network for suspicious traffic by analyzing wireless networking protocols. Network behavior analysis (NBA): examines network traffic to identify threats that generate unusual traffic flows, such as distributed denial of service […]
Least privilege and Need-to
Need-to-know Need-to-have Need-to-see
Factors of Authentication
Something you know (such as a password) Something you have (such as a smart card) Something you are (such as a fingerprint or other biometric method) Somewhere you are (such as a geolocation or geotagging system) Something you do (such as voice patterns, handwriting analysis …)
Identity and Access Management
AAA Identity and Authentication Authorization Accountability
What Is the CIA Triad? (Information Security)
Confidentiality Integrity Availability
CDN Providers for Your WordPress Website
CloudFlare Sucuri CDN KeyCDN