HACKERS ONLY:
Essential Ports for Network Protocols & Services
HTTP (80) & HTTPS (443) - Web traffic essentials.
SSH (22) - Secure remote access.
FTP (21) - File transfers made easy.
DNS (53) - Resolving domain names.
MySQL (3306) - Database connectivity.
Kubernetes API (6443) - Managing containerized applications.
Docker Daemon API (2375/2376) - Container management and orchestration.
MongoDB (27017) - NoSQL database operations.
NGINX (80/443) - Web server flexibility.
Grafana (3000) & Prometheus (9090) - Monitoring and visualization.
Tomcat (8080) & Apache Kafka (9092) - Application server and messaging.
Redis (6379) - In-memory data structure store.
RDP (3389) - Remote desktop protocol for Windows.
ElasticSearch API (9200) - Search engine capabilities.
Jenkins (8080) - Continuous integration and delivery.
SMTP (25) - Email services.
Source:
https://www.linkedin.com/posts/ibrahim-mahamat-adoum-654413180_networking-itsecurity-devops-activity-7261381940568641537-MW0C?utm_source=share&utm_medium
Essential Ports for Network Protocols & Services
HTTP (80) & HTTPS (443) - Web traffic essentials.
SSH (22) - Secure remote access.
FTP (21) - File transfers made easy.
DNS (53) - Resolving domain names.
MySQL (3306) - Database connectivity.
Kubernetes API (6443) - Managing containerized applications.
Docker Daemon API (2375/2376) - Container management and orchestration.
MongoDB (27017) - NoSQL database operations.
NGINX (80/443) - Web server flexibility.
Grafana (3000) & Prometheus (9090) - Monitoring and visualization.
Tomcat (8080) & Apache Kafka (9092) - Application server and messaging.
Redis (6379) - In-memory data structure store.
RDP (3389) - Remote desktop protocol for Windows.
ElasticSearch API (9200) - Search engine capabilities.
Jenkins (8080) - Continuous integration and delivery.
SMTP (25) - Email services.
Source:
https://www.linkedin.com/posts/ibrahim-mahamat-adoum-654413180_networking-itsecurity-devops-activity-7261381940568641537-MW0C?utm_source=share&utm_medium
Now it's Free Limited, Official Cisco Intrusion Detection & Prevention course:
YOU Will Learn:
Describe Cisco Secure Firewall Threat Defense
Describe Cisco Secure Firewall
Threat Defense Deployment Options
Describe management options for Cisco Secure Firewall Threat Defense
Configure basic initial settings on Cisco Secure Firewall Threat Defense
Configure high availability on Cisco
Secure Firewall Threat Defense
Configure basic Network Address
Translation on Cisco Secure
Firewall Threat Defense
Describe Cisco Secure Firewall Threat Defense policies and explain how different policies influence packet processing through the device
Configure Discovery Policy on Cisco Secure Firewall Threat Defense
Configure and explain prefilter and tunnel rules in prefilter policy
Configure an access control policy on Cisco Secure Firewall Threat Defense
Configure security intelligence on Cisco Secure Firewall Threat Defense
Configure file policy on Cisco Secure Firewall Threat Defense
Configure Intrusion Policy on Cisco Secure Firewall Threat Defense
Perform basic threat analysis using Cisco Secure Firewall Management Center
Perform basic management and system administration tasks on Cisco Secure Firewall Threat Defense
Perform basic traffic flow troubleshooting on Cisco Secure Firewall Threat Defense
Manage Cisco Secure Firewall Threat Defense with Cisco Secure Firewall Threat Defense Manager
ACCESS:
https://www.linkedin.com/learning/cisco-network-security-intrusion-detection-and-prevention/what-you-should-know
YOU Will Learn:
Describe Cisco Secure Firewall Threat Defense
Describe Cisco Secure Firewall
Threat Defense Deployment Options
Describe management options for Cisco Secure Firewall Threat Defense
Configure basic initial settings on Cisco Secure Firewall Threat Defense
Configure high availability on Cisco
Secure Firewall Threat Defense
Configure basic Network Address
Translation on Cisco Secure
Firewall Threat Defense
Describe Cisco Secure Firewall Threat Defense policies and explain how different policies influence packet processing through the device
Configure Discovery Policy on Cisco Secure Firewall Threat Defense
Configure and explain prefilter and tunnel rules in prefilter policy
Configure an access control policy on Cisco Secure Firewall Threat Defense
Configure security intelligence on Cisco Secure Firewall Threat Defense
Configure file policy on Cisco Secure Firewall Threat Defense
Configure Intrusion Policy on Cisco Secure Firewall Threat Defense
Perform basic threat analysis using Cisco Secure Firewall Management Center
Perform basic management and system administration tasks on Cisco Secure Firewall Threat Defense
Perform basic traffic flow troubleshooting on Cisco Secure Firewall Threat Defense
Manage Cisco Secure Firewall Threat Defense with Cisco Secure Firewall Threat Defense Manager
ACCESS:
https://www.linkedin.com/learning/cisco-network-security-intrusion-detection-and-prevention/what-you-should-know
LinkedIn
What you should know - Cisco Routers Video Tutorial | LinkedIn Learning, formerly Lynda.com
Join Lisa Bock for an in-depth discussion in this video, What you should know, part of Cisco Network Security: Intrusion Detection and Prevention.
Top 10 Most Dangerous AI Tools Used By Hackers In 2024 (INTEL-AS-A-WEAPON)
https://youtu.be/Y49CmATRggg
https://youtu.be/Y49CmATRggg
YouTube
Top 10 Most Dangerous AI Tools Used By Hackers In 2024 (INTEL-AS-A-WEAPON)
These AI tools range from sophisticated malware creation to password cracking and much more. Explore how these darkweb AI models work, their origins, and what their rise means for the future of cybersecurity.
AI Marketplace: https://taimine.com/
Deep Learning…
AI Marketplace: https://taimine.com/
Deep Learning…
This media is not supported in your browser
VIEW IN TELEGRAM
🎩 Hacker Prank
Free Baby. Amazon Web Services (AWS) - Zero to Hero
https://www.udemy.com/course/amazon-web-services-aws-v/
https://www.udemy.com/course/amazon-web-services-aws-v/
Udemy
Free Amazon AWS Tutorial - Amazon Web Services (AWS) - Zero to Hero
Beginners, Zero to Hero. AWS EC2 web server, NodeJS Server, AWS RDS database server, S3, SES & CloudWatch. FREE - Free Course
Hackers Pro's Utilities:
Abusing ML model file formats to create malware on AI systems: A proof of concept
https://github.com/Azure/counterfit/wiki/Abusing-ML-model-file-formats-to-create-malware-on-AI-systems:-A-proof-of-concept
Abusing ML model file formats to create malware on AI systems: A proof of concept
https://github.com/Azure/counterfit/wiki/Abusing-ML-model-file-formats-to-create-malware-on-AI-systems:-A-proof-of-concept
GitHub
Abusing ML model file formats to create malware on AI systems: A proof of concept
a CLI that provides a generic automation layer for assessing the security of ML models - Azure/counterfit
Forwarded from UNDERCODE COMMUNITY (dvm)
What is the Tor Nodes Safety Level in 2024 ?
Final Results
71%
1% unsecure
0%
50%
14%
90% Anonymous
14%
Happy new year (I'm a beginer)😊