loader

Network Simu/Emu Tools, EVE-NG [02]

we've come from the previous page here… Installing Client tools | Linux Client integration pack According to the GitHub source it says that the repo contains the equivalent of EVE-NG windows Client-side pack for Ubuntu/Debian and other Linux distros.Currently supports the following URL schemes: telnet:// capture:// docker:// vnc:// Installing eve-ng-integration from the official PPA sudo […]

Network Simu/Emu Tools, EVE-NG [01]

Lab Introduction It is undeniable that during a learning process it would be helpful if we could deal with the examples of real-life challenges in order to commit to memory and put them into practice. For practicing in the realm of data transmission network. They help to simulate and emulate the traffic flow, configurations, related […]

Network Simu/Emu Tools, GNS3 [01]

Lab Introduction It is undeniable that during a learning process it would be helpful if we could deal with the examples of real-life challenges in order to commit to memory and put them into practice. For practicing in the realm of data transmission network. They help to simulate and emulate the traffic flow, configurations, related […]

CCNA Course Curriculum

Network Fundamentals Lab Introduction Cisco Packet tracer GNS3 EVE-NG Open Systems Interconnection OSI Model Review OSI Layer 1 – The Physical Layer OSI Layer 2 – Data-Link, Describe and verify switching concepts MAC LLC OSI Layer 3 – The Network Layer OSI Layer 4 – The Transport Layer TCP UDP Compare TCP to UDP OSI […]

You’ll be sorry if you miss CCNA

Scope of Work You’ll be sorry if you miss CCNA to climb your IT career ladder. Your career in networking begins with CCNA. The Cisco certification program was drastically changed on Feb. 24, 2020. There are no longer multiple different CCNA exams and certifications – only a single, comprehensive exam is available. The new exam’s code is 200-301 […]

What Is Managed Detection and Response (MDR)?

Managed Detection and Response (MDR) is one of the security processes organizations use that outsource their data and resources security. In a more straightforward sense, organizations to protect themselves and their data and detect and monitor threats within the organization instead of making a security operations center, hiring and creating a security team/incidents response team/threat […]

What Is PreOS Boot Attack? Persistence Tactics

One of Persistence’s advanced tactics in cyber security is the PreOS Boot technique. In this article, we will introduce this security tactic to stabilize access. MITRE ATT&CK ID: T1542 Sub-techniques: T1542.001, T1542.002, T1542.003, T1542.004, T1542.005 Tactics: Defense Evasion, Persistence Platforms: Linux, Network, Windows, macOS Defense Bypassed: Anti-virus, File monitoring, Host intrusion prevention systems What Is Persistence […]