Yaksas CSC

Your Guardian in the Cyber World

  • Yaksas CSC Home
  • Home
  • About Us
    • Overview
    • Why Yakṣas?
  • Got a Question?
    • Cyber Security Basics
    • Cyber Security Education & Career
    • How to stay safe?
  • Get Invloved
    • Write for Us
    • YCSC QnA Dialogue
    • Translate Articles
  • Contact Yakṣas
  • Press Release
    • NCSAM 2015 Champion
    • STOP. THINK. CONNECT. Partner

Write for Us

We are always looking for experts to share their knowledge with the readers of
Yakṣas Blog by writing articles on their areas of interest.

We cover a myriad of topics—network security, malware analysis, application
security, GRC, hands-on tutorials for newbies and even good resources such as
books, movies and TV Shows related to the world of Cyber Security. Following are a
few article genres that top our list:

  • Certifications: Everything You Need to Know
  • Mass Surveillance
  • Information Privacy
  • Internet of Everything
  • Mobile Application Security

But, of course, we’re open to other topics also. So, if you’ve got an interesting idea,
we look forward to hearing from you. All you have to do is either fill the form below or drop us a mail at csc (at) yaksas (dot) in.

If you’re interested, then here’s the deal: there are a few basic steps that one has to
follow before submitting an article. First of all, we need to know the article idea so
that we can let you know whether it is relevant or not, or if we have already covered
the same in a previous posts.

Once the idea is discussed upon and approved, you can send us a proposal of what
you wish to include in the article or, in other words, the “Table of Contents” of the
article (ToC). After that, you can email your article. A technical review of the article
shall be done and the suitability of the same shall be intimated accordingly.

    *Name:

    *Email:

    *Article Title:

    *Table of Content / Abstract

    Solve the reCaptcha:

    Optin Form

    Search

    Follow us on Twitter

    My Tweets

    Categories

    Tags

    Active directory Active directory lab adsecurity adsi adsisearcher Android attack active directory awareness blue whale challenge Certification CISSP crte crtp cyber-warfare Cyber Security Cybersecurity books Cybersecurity Cannon domain enumeration Edward Snowden ellitedevs forest enumeration hacker Information Security ISACA Kali Linux lab environment lab hardware Mass Surveillance Mobile Security Narendra Modi NSA offensive security Online Safety Password Penetration Testing pentest powersploit Powerview privacy red team Risk Management Social Media user enumeration Wifi Windows

    Top Posts

    • Active Directory User Enumeration using PowerView
      Active Directory User Enumeration using PowerView
    • Social-Engineer Toolkit: An Introduction
      Social-Engineer Toolkit: An Introduction
    • Mona.py for exploit devs: 6 must know commands
      Mona.py for exploit devs: 6 must know commands
    • Active Directory Network Recon using PowerView
      Active Directory Network Recon using PowerView
    • ADSISearcher (Part 2)
      ADSISearcher (Part 2)
    • Introduction to MITRE ATT&CK Framework
      Introduction to MITRE ATT&CK Framework

    © Copyright 2020 ElliteDevs · All Rights Reserved · Powered by WordPress