Yaksas Security

Cyber Security Research

  • Yaksas Security Home
  • Home
  • Yaksas Security Classroom
  • Learn Adversary Emulation
  • Contact Yaksas
YCSC QnA with Keith Pradeep Fernandez

Uday Mittal September 16, 2015 Leave a Comment

YCSC QnA with Keith Pradeep Fernandez

About Keith Pradeep Fernandez Keith, CIPP/IT, CISSP, CISA, CISP, is a seasoned Security and Privacy Professional with a rich experience of over 15+ years in various geographies (US, Australia, Middle East, India) and industries like IT Consulting, Internet and telecom Service Providers and software development firms including a fortune 500 client. He is currently working as […]

Filed Under: YCSC QnA Tagged With: CISSP, Cyber Security, Interview, Security and privacy professional

CSX Fundamentals: Everything You Need to Know

Uday Mittal August 26, 2015 7 Comments

CSX Fundamentals: Everything You Need to Know

Last year, ISACA launched a new series of certifications, focused on Cyber Security, called CyberSecurity Nexus (CSX) Certifications. This series contains a total of eight certifications leading to either CSX Expert or CISM. Image Source: Isaca.org CSX Fundamentals is the first certification in this series. I started my certification path with it and would like to […]

Filed Under: Upcoming Certifications Tagged With: CSX, CSX Fundamentals, Cyber Security, ISACA

Build Your Career in Cyber Security

Uday Mittal August 14, 2015 2 Comments

Build Your Career in Cyber Security

A question I get asked a lot these days is, how did I get into the field of Cyber Security? Ever since I started using computers, I’ve been fascinated and thrilled by this field. I started hacking (in it’s true sense) at an early age of 14. The first time I tried to install Linux, I accidentally […]

Filed Under: Higher Education, Skills Development Tagged With: Colleges, Cyber Security, Graduate Courses, M. Tech Information Security

  • « Previous Page
  • 1
  • 2

Optin Form

Search

Follow us on Twitter

My Tweets

Categories

Tags

(ISC)2 Active directory adsecurity adsi adsisearcher adversary emulation Android attack active directory awareness blue whale challenge Certification CISSP Cloud security command and control crte crtp cyber-warfare Cyber Security cybersecurity Cybersecurity books Cybersecurity Cannon domain enumeration ethical hacking forest enumeration hacker Information Security ISACA Kali Linux Mass Surveillance Narendra Modi offensive security Online Safety opsec Password Penetration Testing pentest poshc2 powersploit Powerview privacy red team red teaming Risk Management Social Engineering user enumeration

Top Posts

  • Mr. Robot: Fsociety deploys ransomware
    Mr. Robot: Fsociety deploys ransomware
  • 7 Ways to Cover Your Device's Camera
    7 Ways to Cover Your Device's Camera
  • Active Directory User Enumeration using PowerView
    Active Directory User Enumeration using PowerView
  • SPN Scanning using ADSI (Part 3)
    SPN Scanning using ADSI (Part 3)
  • Book Review: Penetration Testing Azure for Ethical Hackers
    Book Review: Penetration Testing Azure for Ethical Hackers
  • DCPP: Everything You Need to Know
    DCPP: Everything You Need to Know

© Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress