Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas

Overview

Yakṣas Cyber Security Champions (CSC), is an organization of Cyber Security Professionals (CSPs), dedicated to protect you and your assets in the Cyber World. Read here to know who were Yakṣas and why we chose this name.

Vision Statement

Create and contribute in an ecosystem where any advancement in the fields of Computer Science and Information Technology continues to be, primarily, an enabler and encourages further development and enhancement of the same.

Mission Statement(s)

  • Ensure the safety and security of people interacting with the Cyber World, in an ethical manner, either as a part of their day to day activities or as a one time transaction.
  • Ensure organizations, of any constitution, except those involved in illegal activities, stay safe and protected from cyber crimes, of any nature, that may pose a threat to their employees and business operations.
  • Contribute to the field of Cyber Security by committing ourselves to active research and sharing our results in an ethical and professional manner.
  • Encourage the advancement of Cyber Security profession by providing proper guidance to those who wish to pursue it and committing ourselves to the continuous education and skill enhancement of our active employees.

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security crte crtp cyber-warfare cybersecurity Cyber Security Cybersecurity books domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mobile Security Narendra Modi NSA offensive security Online Safety opsec Password Penetration Testing pentest powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration Wifi Windows

Top Posts

  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • What is Adversary Emulation?
    What is Adversary Emulation?
  • Build Your Career in Cyber Security
    Build Your Career in Cyber Security
  • CISA: Everything You Need to Know
    CISA: Everything You Need to Know
  • Let there be no more MMS Scandals
    Let there be no more MMS Scandals
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress