Cyber-security resources
- Use different search engines
- Banner grab
- httrack
- inspy
- metagoofil
- intitle:"index of"
- DNS poison/spoof
Infosec websites
Considerations
- Language vulnerabilities
- Common cyber attacks
- Tor
- Crypto attacks - frequency analysis
- Data encryption standard
- AES advanced encryption standard
- Substitution permutation network
- Kali Linux
- Vulnerability research with reverse engineering, penetration testing and ethical hacking
- Low level Linux programming and/or comprehensive knowledge in operating system security and associated network/platform design, hardening and deployment.
- Cyber-security and certification such as such as CISSP, SANS GIAC, Security+, Network+, Linux+, MCSE, CCNA or SSCP.
- Capture and decomposition through to integration, acceptance and customer sign off and associated toolsets.
References