Cyber Security Architect
Image for post
Image for post
Source

How to detect a cyber attack or a threat

  1. Threat Detection Concept
  2. How We Can Detect Threats

1. Threat Detection Team


Image for post
Image for post
Source

+ SMTP technique :


Image for post
Image for post
Source

Proxy types and how it works


Image for post
Image for post
Source


Image for post
Image for post
Source

SOC technology and Best Practice

1- What is SOC?


Image for post
Image for post
Source

TLS Overview

Introduction


Image for post
Image for post

Enumeration

  • Introduction
  • Why Enumeration?
  • Enumeration techniques
  • Enumeration Tools on Linux and Windows
  • Summary

Introduction

  1. Footprinting
  2. Scanning
  3. Enumeration
  4. Vulnerability assessment.


Image for post
Image for post
Source

Rsyslog configuring with TLS (send log file)

1. Rsyslog

2. TLS


Image for post
Image for post
Source

Use Threat Intelligence and Python Scripts In Malware Detection

  1. Threat Intelligence definition
  2. Blacklisted IP
  3. Blacklisted Domain
  4. Blacklisted Certificate

1. Threat Intelligence definition


Image for post
Image for post
Source

+ What is SIEM?

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store