Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
Book Review: How to Hack Like a GHOST

Uday Mittal December 21, 2022

Book Review: How to Hack Like a GHOST

After completing my last book, I decided to go for another Sparc Flow book. Full disclosure, it had been in my partial read pile for some time (don’t let that reflect on the quality of the book, that’s totally on me). This review is for the book How to Hack Like a GHOST by Sparc […]

Filed Under: Adversary Emulation, Book Reviews Tagged With: adversary emulation, Cloud security, cybersecurity, devops, opsec, red team

Book Review: CCSP For Dummies

Uday Mittal July 5, 2022

Book Review: CCSP For Dummies

I recently enrolled for the Certified Cloud Security Professional certification by (ISC)2. One of the books recommended to me for preparing for this certification was CCSP for Dummies by Arthur J. Deane. It was published in November 2020 by For Dummies publication (a brand of John Wiley & Sons, Inc). I will not go into […]

Filed Under: Book Reviews, Essential Certifications Tagged With: (ISC)2, ccsp, Cloud security

Book Review: Pentesting Azure Applications

Uday Mittal December 27, 2021 Leave a Comment

Book Review: Pentesting Azure Applications

In continuance of my research in cloud security, I picked up another book on Azure security. The book was Pentesting Azure Applications – The Definitive Guide to Testing and Securing Deployments by Matt Burrough. I got it as part of the Humble Book Bundle.  It was published in July 2018 and was the only book […]

Filed Under: Book Reviews Tagged With: azue, Cloud security, Penetration Testing

Book Review: Penetration Testing Azure for Ethical Hackers

Uday Mittal December 23, 2021

Book Review: Penetration Testing Azure for Ethical Hackers

I have been researching cloud security off late. Recently, the book, Penetration Testing Azure for Ethical Hackers by David Okeyode , Karl Fosaaen, showed up on my Twitter feed. The book had good reviews so I decided to pick it up.  It was published recently (at the time of writing), in November 2021 (another reason […]

Filed Under: Book Reviews Tagged With: Azure, Azure Active Directory, Cloud security, Penetration Testing

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security crte crtp cyber-warfare cybersecurity Cyber Security Cybersecurity books domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mobile Security Narendra Modi NSA offensive security Online Safety opsec Password Penetration Testing pentest powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration Wifi Windows

Top Posts

  • ADSISearcher (Part 2)
    ADSISearcher (Part 2)
  • Social-Engineer Toolkit: An Introduction
    Social-Engineer Toolkit: An Introduction
  • Let there be no more MMS Scandals
    Let there be no more MMS Scandals
  • Make Remote Access Your Ally
    Make Remote Access Your Ally
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera
  • Mona.py for exploit devs: 6 must know commands
    Mona.py for exploit devs: 6 must know commands

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress