Open in app

Sign In

Write

Sign In

Shakhawat Hossain
Shakhawat Hossain

283 Followers

Home

About

6 days ago

Phishing Attack Explained

“Hello and welcome to our channel. Today, we’re going to talk about one of the most common types of cyber attacks: phishing. In 2016, during the US presidential campaign, a phishing attack was carried out against Hillary Clinton’s campaign chairman, John Podesta. The attackers sent a phishing email that appeared…

Cyberattack

2 min read

Phishing Attack Explained
Phishing Attack Explained
Cyberattack

2 min read


Feb 28

A Process for Mobilizing Learning

DO YOUR HOMEWORK Prepare before bringing factions together. Do you understand their perspectives? What do they stand to lose? What learning, i.e., changes in stakes and perspective, need to occur? Speaking with individuals separately can also provide invaluable insight and help you gain informal authority. GATHER ALL VIEWS Let each faction speak for itself. How do…

Leadership

2 min read

Leadership

2 min read


Feb 26

TOP PenTest Certification 2023 | Red Team Certs

Are you interested in earning a PenTest certification? I placed some in great demand on the market. Video Version: eJPT (eLearnSecurity Junior Penetration Tester) An excellent certification for those who are starting their journey as a PenTester, a practical certification that focuses on points such as PenTest in Networks and Web. PENTEST+ (CompTIA) A PenTest certification that focuses…

Pentesting

2 min read

TOP PenTest Certification 2023 | Red Team Certs
TOP PenTest Certification 2023 | Red Team Certs
Pentesting

2 min read


Dec 30, 2022

Is it possible to install Arch Linux on a USB drive? Live Arch USB

Yes, it is possible to install Arch Linux on a USB drive. This is known as creating a “live USB” of Arch Linux. To create a live USB of Arch Linux, you will need the following: A USB drive with at least 2GB of available storage space A computer with…

Arch Linux

2 min read

Is it possible to install Arch Linux on a USB drive? Live Arch USB
Is it possible to install Arch Linux on a USB drive? Live Arch USB
Arch Linux

2 min read


Dec 26, 2022

Authentication :: Cybersecurity

When users have stated their identity, it is necessary to validate that they are the rightful owners of that identity. This process of verifying or proving the user’s identification is known as authentication. “Access control process validating that the identity being claimed by a user or entity is known to…

Cybersecurity

2 min read

Authentication :: Cybersecurity
Authentication :: Cybersecurity
Cybersecurity

2 min read


Oct 23, 2022

Resources for CC (ISC)² - Certified in Cybersecurity

Here are some useful materials to study for the CC (ISC)² — Certified in Cybersecurity….. Video Version on my channel: CompTIA Security+ SY0–601 Training | CompTIA Security+ Course | CompTIA Security+ 601 | Lesson 1–6 In this video we have covered the first 6 lessons of the CompTIA Security+ SY0–601 Training, We have discussed various fundamental topics which are mentioned below: 1) Security Roles…

Cybersecurity

2 min read

Cybersecurity

2 min read


Sep 6, 2022

What is Packet Sniffer?

A packet sniffer — is also known as a packet analyzer, protocol analyzer, or network analyzer is a piece of hardware or software used to monitor network traffic. Sniffers work by examining streams of data packets that flow between computers on a network as well as between networked computers and…

Infosec

2 min read

What is Packet Sniffer?
What is Packet Sniffer?
Infosec

2 min read


Aug 7, 2022

Top 5 Security Issue with COOKIES

What are Cookies? Cookies are text files with small pieces of data like username and password that are used to identity your computer as you use a computer network.

Infosec

2 min read

Top 5 Security Issue with COOKIES
Top 5 Security Issue with COOKIES
Infosec

2 min read


Jun 22, 2022

Want to learn Learn Web3? These are FREE Resources

The List of Web3 Articles and Courses Here is the list of free learn resourses that can help you to learn how How to Develop Smart Contracts for Ethereum Blockchain. Get started Building Web3 Apps with Cloudflare Learn how to build Web3 applications with Cloudflare’s new open-source template https://blog.cloudflare.com/get-started-web3/ GitHub - cloudflare/cfweb3 CFWeb3 is a Web3 demo application. It uses Hardhat and Solidity to create an Ethereum smart contract. This code is a…github.com

Web3

3 min read

Want to learn Learn Web3? These are FREE Resources
Want to learn Learn Web3? These are FREE Resources
Web3

3 min read


Jun 12, 2022

Single most valuable resource: Bug Bounty Hunting

As a Bug Bounty Hunter, what is the single most valuable resource (course, blog, cert, book) that has boosted your skills the most? Book: @vickieli7‘s BBB + @yaworsk‘s WH101 + RWBH Blogs: @InfoSecComm Courses: @OffensiveHunter + @NahamSec + @HusseiN98D + @theXSSrat Platform: @PortSwigger‘s @WebSecAcademy + @snyff ‘s @PentesterLab + @zseano‘s @BugBountyHunt3r PS: Got all of them for free;) Methodologies: Reconnaissance: @Jhaddix + @harshbothra_ + @zseano

Bug Bounty

1 min read

Single most valuable resource: Bug Bounty Hunting
Single most valuable resource: Bug Bounty Hunting
Bug Bounty

1 min read

Shakhawat Hossain

Shakhawat Hossain

283 Followers

Learning Penetration Testing && Cyber Security

Following
  • Gnana Aravind K

    Gnana Aravind K

  • Proviesec

    Proviesec

  • Ramalingasamy

    Ramalingasamy

  • Mohammad Mohsin

    Mohammad Mohsin

  • Hackers League

    Hackers League

Help

Status

Writers

Blog

Careers

Privacy

Terms

About

Text to speech