Tool | OSINT | linkedin2username
linkedin2username in one sentence Generate username lists from companies on LinkedIn. Implementation method A web-scraper based on the selenium module in python Two use cases We can start the lin...
linkedin2username in one sentence Generate username lists from companies on LinkedIn. Implementation method A web-scraper based on the selenium module in python Two use cases We can start the lin...
What is difference between IT and IACS/OT? Strategic aspect The security of IACS/OT has to address the issues of health, safety and environment The priorities of the IT and OT are generally i...
What is Nessus? Nessus is a platform developed by Tenable that scans for security vulnerabilities in devices, applications, operating systems, cloud services and other network resources. It is main...
ISA/IEC 62443 industrial security framework Taxanomies What is control system cybersecurity? Electronic security: actions required toprotect critical systems or informational assetsfrom unautho...
In the pentest, the service enumeration is essential for getting the first step on the target host. Every service offered by the destination has a specific purpose and can be utilized by us. As a r...
Goals of documentation and reporting to produce evidence for the client to attempt to troubleshoot an issue. to not scramble to re-do testing after losing evidence or ask a client for more tim...
Claude Sam-Foh’s suggestions on beginning the career in cybersecurity Core concept: Do more than security Think about you want to do technology side or buissiness side of the cybersecurity Fo...
One sentence to introduce GitHub Copilot: Created by OpenAI, GitHub Copilot’s generative pretrained language model draws context from comments and code to suggest individual lines and whole functio...
What will be an ideal candidate Your online profile (LinkedIn, Youtube, etc.) matters: showing up your role as a cybersecurity guy Easy to contact, easy to follow up What is the most importa...