SOC Third Defense Phase – Understanding Your Organization Assets

In our first phase, we have seen the basic defense mechanisms which was recommended in organizations. In our second phase,...
Intrusion Detection System (IDS)  and Its Detailed Working Function – SOC/SIEM

Intrusion Detection System (IDS) and Its Detailed Working Function – SOC/SIEM

An intrusion detection system (IDS) is a type of security software designed to automatically alert administrators when someone or something is trying to compromise...
Windows Registry Analysis-Tracking Every activity

Windows Registry Analysis – Tracking Every Activity That You Do on the Windows System

The purpose of this article is to provide you with a depth understanding of the Windows Registry and Wealth of information it...
Intrusion Prevention System

Intrusion Prevention System (IPS) In-depth Analysis – A Detailed Guide

Like an intrusion detection system (IDS), an intrusion prevention system (IPS) screens network traffic. An Intrusion Prevention System (IPS) is a framework...
attack chain

SOC First Defense phase – Understanding the Cyber Attack Chain – A Defense Approach...

This article will help you to understand the modern cyber threats and the most commonly used attack surfaces behind any malware/cyber-attacks. In most...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security