Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
Book Review: CCSP For Dummies

Uday Mittal July 5, 2022

Book Review: CCSP For Dummies

I recently enrolled for the Certified Cloud Security Professional certification by (ISC)2. One of the books recommended to me for preparing for this certification was CCSP for Dummies by Arthur J. Deane. It was published in November 2020 by For Dummies publication (a brand of John Wiley & Sons, Inc). I will not go into […]

Filed Under: Book Reviews, Essential Certifications Tagged With: (ISC)2, ccsp, Cloud security

CISM: Everything You Need to Know

Uday Mittal April 2, 2016 Leave a Comment

CISM: Everything You Need to Know

With 11th June, 2016 approaching fast, I am sure many of our aspiring readers would be looking for information on Certified Information Security Manager (CISM) certification. Wouldn’t it be beneficial, in terms of time and effort, if you could get all your questions answered in one place? Wait! You’re at that place already. Given the […]

Filed Under: Essential Certifications Tagged With: Certification, CISM, Incident Management, Information Security, ISACA, Risk Management

CISA: Everything You Need to Know

Uday Mittal August 17, 2015 Leave a Comment

CISA: Everything You Need to Know

The second round of CISA examination is around the corner and from my personal experience I know that this is the time when aspirants are on the hunt for good material and tips. Given the value that CISA Certification holds, I would like to share my experience (as much as I can without violating the […]

Filed Under: Essential Certifications, Skills Development Tagged With: CISA, CISA Review Manual, ISACA, Peter Gregory

CISSP: Everything You Need to Know

Uday Mittal June 28, 2015 1 Comment

CISSP: Everything You Need to Know

I had been waiting for this moment since past few months and it happened yesterday, I passed the CISSP Certification exam in first attempt. Yay! Before I write further, I would like to thank my ex-colleagues and friends who guided me and patiently answered my endless barrageĀ of questions regarding the certification process. Given the value […]

Filed Under: Essential Certifications Tagged With: (ISC)2, Certification, CISSP, Eric Conard, Information Security, Shon Harris

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security crte crtp cyber-warfare cybersecurity Cyber Security Cybersecurity books domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mobile Security Narendra Modi NSA offensive security Online Safety opsec Password Penetration Testing pentest powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration Wifi Windows

Top Posts

  • ADSISearcher (Part 2)
    ADSISearcher (Part 2)
  • Social-Engineer Toolkit: An Introduction
    Social-Engineer Toolkit: An Introduction
  • Let there be no more MMS Scandals
    Let there be no more MMS Scandals
  • Make Remote Access Your Ally
    Make Remote Access Your Ally
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera
  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress