Welcome to the “add to favorites” section. Today there will be a good selection of tips (in pictures) for beginners #IB specialists. An information security specialist is not the easiest, but in-demand IT profession. It scares with a lot of terms and peculiar tools, although it is actually accessible to people without a technical background. After studying IS, you will work with public corporations, banks, medium and large businesses, cloud services and startups. Simply put, anywhere there is a possibility of hacking. Typically, an information security professional refers to a person who can implement and maintain protection against unauthorized access. Configure the network, predict errors and potential bugs, deploy and run connection monitoring technologies.
The main tasks of an IT specialist are to configure tools for protection and monitoring, write scripts to automate processes, and occasionally conduct pentests while feeling like a hacker. Monitor general system indicators and administer information protection tools. An IS specialist is not always a creative profession. Usually on the contrary, there is no need to invent anything and reinvent the wheel. The specialist takes a ready-made checklist or instruction, and then implements the protection system. Tests it, finds bugs, fixes them. And then a new iteration. If you plan to build a career in the field of information security, you should look for courses that teach the full implementation of the protection system. By the way, hints are a great helper when working with a certain software or system. With their help, you will be able to improve your skills in a certain area and reduce the time it takes to complete tasks to get the desired result.
Memory of network topologies.
OSI model cheat sheet.
Cyberattacks at the OSI layer.
Kali Linux cheat sheet.
Log analysis cheat sheet.
Nmap+ Nessus cheat sheet.
Cheat sheet of hacking tools.
Network monitoring company.
Cheat sheet with Wireshark.
Cheat sheet with TCP and UDP port numbers.
Cheat sheet from computer networks.
Note from Active Directory domains.
Cheat sheets by port numbers.
Cheat sheets for using JTR.
In this cheat sheet, we will look at SSH commands.
This note uses Windows commands.
Basic Linux terminal commands with examples.
We’ve selected a list of teams and put them into a handy Nikto cheat sheet.
The cheat sheet contains various tips for using Netcat on both Linux and Unix.
This cheat sheet describes common PowerShell options and techniques.
Sqlmap is a powerful, open source, automated penetration testing tool.
Displays the open services on the target machine along with other useful information.
Is a standardized reference framework for conceptualizing data exchange between networks.
Describe the general parameters for the various components of Metasploit Famework.
SSL/TLS is a negotiation between two sides of a network to establish the details of their connection.
Linux Command Line Cheat Sheet is a command line cheat sheet.