Yaksas CSC

Your Guardian in the Cyber World

  • Yaksas CSC Home
  • Home
  • About Us
    • Overview
    • Why Yakṣas?
  • Got a Question?
    • Cyber Security Basics
    • Cyber Security Education & Career
    • How to stay safe?
  • Get Invloved
    • Write for Us
    • YCSC QnA Dialogue
    • Translate Articles
  • Contact Yakṣas
  • Press Release
    • NCSAM 2015 Champion
    • STOP. THINK. CONNECT. Partner

Overview

Yakṣas Cyber Security Champions (CSC), is an organization of Cyber Security Professionals (CSPs), dedicated to protect you and your assets in the Cyber World. Read here to know who were Yakṣas and why we chose this name.

Vision Statement

Create and contribute in an ecosystem where any advancement in the fields of Computer Science and Information Technology continues to be, primarily, an enabler and encourages further development and enhancement of the same.

Mission Statement(s)

  • Ensure the safety and security of people interacting with the Cyber World, in an ethical manner, either as a part of their day to day activities or as a one time transaction.
  • Ensure organizations, of any constitution, except those involved in illegal activities, stay safe and protected from cyber crimes, of any nature, that may pose a threat to their employees and business operations.
  • Contribute to the field of Cyber Security by committing ourselves to active research and sharing our results in an ethical and professional manner.
  • Encourage the advancement of Cyber Security profession by providing proper guidance to those who wish to pursue it and committing ourselves to the continuous education and skill enhancement of our active employees.

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

Active directory Active directory lab adsecurity adsi adsisearcher Android attack active directory awareness blue whale challenge Certification CISSP crte crtp cyber-warfare Cyber Security Cybersecurity books Cybersecurity Cannon domain enumeration Edward Snowden ellitedevs forest enumeration hacker Information Security ISACA Kali Linux lab environment lab hardware Mass Surveillance Mobile Security Narendra Modi NSA offensive security Online Safety Password Penetration Testing pentest powersploit Powerview privacy red team Risk Management Social Media user enumeration Wifi Windows

Top Posts

  • Active Directory User Enumeration using PowerView
    Active Directory User Enumeration using PowerView
  • Social-Engineer Toolkit: An Introduction
    Social-Engineer Toolkit: An Introduction
  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands
  • Active Directory Network Recon using PowerView
    Active Directory Network Recon using PowerView
  • ADSISearcher (Part 2)
    ADSISearcher (Part 2)
  • Introduction to MITRE ATT&CK Framework
    Introduction to MITRE ATT&CK Framework

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress