Ramazan SalmanConfiguring Abstract Hop Path Constraint in MPLSSample Path Constraints for Abstract HopsSep 14, 2023Sep 14, 2023
Ramazan SalmanThreat Intelligence Tools & Phishing Analysis - Write upThis room will cover the concepts of Threat Intelligence and various open-source tools that are useful. The learning objectives include:Apr 8, 2023Apr 8, 2023
Ramazan SalmanNessus — Vulnerability ScanningNessus vulnerability scanner is exactly what you think is! A vulnerability scanner!Apr 3, 2023Apr 3, 2023
Ramazan SalmanWireshark: Traffic AnalysisIn this room, I will cover the techniques and key points of traffic analysis with Wireshark and detect suspicious activities.Mar 31, 2023Mar 31, 2023
Ramazan SalmanOSI Model — Open Systems Interconnection ModelTask 1 What is the OSI Model?Mar 10, 2023Mar 10, 2023
Ramazan SalmanIncident handling with Splunk — [Writeup] —This room covers an incident Handling scenario using Splunk. An incident from a security perspective is “Any event or action, that has a…Feb 28, 2023Feb 28, 2023
Ramazan SalmanOWASP Juice Shop — TryHackMeThis room uses the Juice Shop vulnerable web application to learn how to identify and exploit common web application vulnerabilities.Feb 24, 2023Feb 24, 2023
Ramazan SalmanOWASP API Security Top 10–1 from TryHackMe:You learn more about API:Jan 28, 2023Jan 28, 2023
Ramazan SalmanTop 25 Cyber Security Threats..There are many different information security threats that organizations face today. The threat of information security breaches should not…Oct 29, 2022Oct 29, 2022