Системный администратор - Сетевые технологии - Компьютерная помощь
3.5K subscribers
2.43K photos
2.67K videos
773 files
356 links
Канал для системных администраторов или те кто работает в ИТ сфере.
📚КНИГИ ПО
💠Cisco systems
💠Mikrotik
💠VoIP
💠Linux
💠 Windows server
💠 Сетевые технологии
📽Видеоуроки
🤝Поддержка
Наша группа: @SySAD
Feedback bot: @SySADbot
Download Telegram
Hacking APIs Breaking Web Application Programming Interfaces.pdf
23.6 MB
📚 Hacking APIs: Breaking Web Application Programming Interfaces.

• Дата выхода: 5 Июля 2022 года.
• Рейтинг: (5 out of 5)

You’ll learn how REST and GraphQL APIs work in the wild and set up a streamlined API testing lab with Burp Suite and Postman. Then you’ll master tools useful for reconnaissance, endpoint analysis, and fuzzing, such as Kiterunner and OWASP Amass. Next, you’ll learn to perform common attacks, like those targeting an API’s authentication mechanisms and the injection vulnerabilities commonly found in web applications. You’ll also learn techniques for bypassing protections against these attacks.

#Eng #GraphQL #API #Web #OWASP #Hack

@sysadmin1
Please open Telegram to view this post
VIEW IN TELEGRAM
CCNP Security Virtual Private Networks SVPN 300-730.epub
32.2 MB
📚 Security Virtual Private Networks.

• Дата выхода: 2022 год.
• Рейтинг:
This complete study package includes:
• A test-preparation routine proven to help you pass the exams;
• Do I Know This Already? quizzes, which enable you to decide how much time you need to spend on each section;
• Chapter-ending exercises, which help you drill on key concepts you must know thoroughly;
• The powerful Pearson Test Prep Practice Test software, with two full exams comprised of well-reviewed, exam-realistic questions, customization options, and detailed performance reports;
• A final preparation chapter, which guides you through tools and resources to help you craft your review and test-taking strategies;
• Study plan suggestions and templates to help you organize and optimize your study time.
#CCNP #Security #Eng

@sysadmin1
Please open Telegram to view this post
VIEW IN TELEGRAM
Tanenbaum A., Bos H. Modern Operating Systems 5ed 2023.pdf
8.6 MB
📚 Modern Operating Systems.

• Дата выхода: 2023 год.
• Рейтинг: (5 out of 5)
• The 5th Edition keeps pace with modern OS with a new chapter on Windows 11, new security coverage, an emphasis on flash-based solid-state drives and more.
#Windows #Eng

@sysadmin1
Please open Telegram to view this post
VIEW IN TELEGRAM
Network_Protocols_for_Security_Professionals_Probe_and_identify.epub
26.2 MB
📚 Network Protocols for Security Professionals.

• Дата выхода: 2022 год.
• Рейтинг:
This book is a comprehensive guide that begins with the basics, gradually increases in complexity, and later takes you through advanced concepts. You will start by understanding the structure of data network protocols and devices as well as breaches. In addition to this, you’ll become familiar with attacking tools and scripts that take advantage of these breaches. Next, you will perform eavesdropping, learn data analysis, and use behavior analysis for network forensics. Toward the concluding chapters, you will understand network protocols and how to use methods and tools you learned in the previous parts to attack and protect these protocols.

#network #Security #Eng

@sysadmin1
Please open Telegram to view this post
VIEW IN TELEGRAM
CompTIA_Network+_Certification_All_in_One_Exam_Guide,_Eighth_Edition.epub
78.9 MB
📚 CompTIA Network+ Certification All-in-One Exam Guide.

• Дата выхода: 2022 год.
• Рейтинг:
Network architectures;
Cabling and topology;
Ethernet basics;
Network installation;
TCP/IP applications and network protocols;
Routing;
Network naming;
Advanced networking devices;
IPv6;
Remote connectivity;
Wireless networking;
Virtualization and cloud computing;
Mobile networking;
Network operations;
Managing risk;
Network security;
Network monitoring and troubleshooting.

#Network #Eng

@sysadmin1
Please open Telegram to view this post
VIEW IN TELEGRAM
Learn Wireshark.pdf
17.9 MB
📚 Learn Wireshark.

• Дата выхода: 2022 год.
• Рейтинг:
What you will learn:
Master network analysis and troubleshoot anomalies with Wireshark;
Discover the importance of baselining network traffic;
Correlate the OSI model with frame formation in Wireshark;
Narrow in on specific traffic by using display and capture filters;
Conduct deep packet analysis of common protocols: IP, TCP, and ARP;
Understand the role and purpose of;
ICMP, DNS, HTTP, and DHCP;
Create a custom configuration profile and personalize the interface;
Create I/O and stream graphs to better visualize traffic.

#Eng #network #Wireshark

@sysadmin1
Please open Telegram to view this post
VIEW IN TELEGRAM
Hacking.of.Computer.Networks.pdf
22.7 MB
📚 Hacking of Computer Networks.

• Дата выхода: 2018 год.
• Рейтинг:
• The objective of the book is to summarize to the user with main issues in certified ethical hacker course. The complete book consists of many parts:

- Part 1: Lab Setup;
- Part2: Foot printing and Reconnaissance;
- Part 3: Scanning Methodology;
- Part 4: Enumeration;
- Part 5:System Hacking;
- Part 6: Trojans and Backdoors and Viruses;
- Part 7: Sniffer and Phishing Hacking;
- Part 8: Hacking Web Servers;
- Part 9: Hacking Windows and Linux Systems;
- Part 10: Wireless Hacking;
- Part 11: Hacking Mobile Applications.

#Eng #Networks #Hack

@sysadmin1
Please open Telegram to view this post
VIEW IN TELEGRAM
👁 Nmap для хакера. Полезный материал.

• Nmap — культовый сканер, без которого не может обойтись практически ни один хакер. Это мощный и сложный инструмент, код которого вылизывался десятилетиями. Он быстрый, надежный и невероятно функциональный. А главное — полностью бесплатный и работает практически везде.

• Материал будет полезен как новичкам так и специалистам, которые активно используют этот инструмент в работе:

Host Discovery;
Output Format Scan;
Understanding Nmap Packet Trace;
Nmap Scan with Timing Parameters;
Nmap Scans using Hex Value of Flags;
Forensic Investigation of Nmap Scan using Wireshark;
Understanding Guide for Nmap Timing Scan (Firewall Bypass);
Understanding Guide for Nmap Ping Scan (Firewall Bypass);
Comprehensive Guide on Nmap Port Status;
How to Detect NMAP Scan Using Snort;
Understanding Guide to Nmap Firewall Scan (Part 2);
Understanding Guide to Nmap Firewall Scan (Part 1);
Understanding Nmap Scan with Wireshark;
Password Cracking using Nmap;
Vulnerability Scan;
Network Scanning using NMAP (Beginner Guide);
MSSQL Penetration Testing using Nmap;
MySQL Penetration Testing with Nmap.

#ИБ #Eng #Nmap

@sysadmin1
Please open Telegram to view this post
VIEW IN TELEGRAM
CEH_–_Certified_Ethical_Hacker_v11_+1200_Exam_Practice_Questions.pdf
3.4 MB
📚 Certified Ethical Hacker v11 +1200 Exam Practice Questions.

• Дата выхода: 2021 год.
• Рейтинг:
IP Specialists' Practice Questions are dedicatedly designed from a certification exam perspective. The collection of these questions from our Study Guides are prepared keeping the exam blueprint in mind, covering not only important but necessary topics as well. It's an ideal document to practice and revise your certification.

#CEH #Eng

@sysadmin1
Please open Telegram to view this post
VIEW IN TELEGRAM
ISC2_Certified_Information_Systems_Security_Professional_CISSP_Realistic.epub
331.1 KB
📚 Certified Information Systems Security Professional

• Дата выхода: 2022 год.
• Рейтинг:
What you will learn:
• Security and Risk Management;
• Asset Security;
• Security Architecture and Engineering;
• Communication and Network Security;
• Identity and Access Management (IAM);
• Security Assessment and Testing;
• Security Operations;
• Software Development Security;

#Eng #security #CISSP

@sysadmin1
Please open Telegram to view this post
VIEW IN TELEGRAM
Network Security Private Communications in a Public World.epub
7.7 MB
📚 Network Security.

• Дата выхода: 2022 год.
• Рейтинг:
What you will learn:
Network security protocol and cryptography basics;
Design considerations and techniques for secret key and hash algorithms (AES, DES, SHA-1, SHA-2, SHA-3);
First-generation public key algorithms (RSA, Diffie-Hellman, ECC);
How quantum computers work, and why they threaten the first-generation public key algorithms;
Quantum computers: how they work, and why they threaten the first-generation public key algorithms;
Multi-factor authentication of people;
Real-time communication (SSL/TLS, SSH, IPsec);
New applications (electronic money, blockchains);
New cryptographic techniques (homomorphic encryption, secure multiparty computation).

#Eng #Security #Network

@sysadmin1
Please open Telegram to view this post
VIEW IN TELEGRAM