Mohammad ZakariaDifferent management techniques and methods, along with their pros and cons:Pros and cons of different management tool2d ago2d ago
Mohammad ZakariaCyber Security TeminologyCybersecurity (or security): The practice of ensuring confidentiality, integrity, and availability of information by protecting networks…Aug 20Aug 20
Mohammad ZakariaSubdomain Enumerationvarious ways of discovering subdomains to expand your attack surface of a target.Aug 17Aug 17
Mohammad ZakariaContent Discovery | Introduction to Web Hacking — TryHackMeLearn the various ways of discovering hidden or private content on a webserver that could lead to new vulnerabilities.Jul 26Jul 26
Mohammad ZakariaPrinciples of Security Writeup | Jr Penetration Tester — TryHackMeLearn the principles of information security that secures data and protects systems from abuseJul 13Jul 13
Mohammad ZakariaTask 1: What is Penetration Testing?Penetration testing (pentesting) is an ethical approach to testing and analyzing the security defenses of a system or application. It uses…Jul 12Jul 12
Mohammad ZakariaAttributes and characteristics of true believers. (TMQ 23:1–11)بِسْمِ اللَّهِ الرَّحْمَـٰنِ الرَّحِيمِJul 11Jul 11
Mohammad ZakariaWhat is Occam’s Razor?Occam’s Razor is a problem-solving principle that suggests the simplest explanation is usually the correct one i.e. it recommends searching…Jul 10Jul 10