tech.bitvijays.com
The Essentials
Cybersecurity in an Enterprise
Linux Basics
Cloud Infrastructure Technologies
Open Source Concepts
Secure Software Development Fundamentals
Infrastructure Pentest
Intelligence Gathering
Vulnerability Analysis
Exploitation
Post Exploitation
Reporting
Configuration Review
Vulnerable Machines
Initial Recon
From Nothing to a Unprivileged Shell
Unprivileged Shell to Privileged Shell
Tips and Tricks
Appendix
CTF - Challenges
Binary Exploitation
Forensics
Reverse Engineering
Cryptography
Coding Quick Reference
Critical Infrastructure
Industrial Control Systems
Electrical Grid
tech.bitvijays.com
Index
Index