Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

19 total results found

Class1

Cibersecurity Threat hunting

https://go.kaspersky.com/rs/802-IJN-240/images/Common-TTPs-of-the-modern-ransomware_low-res.pdf https://attack.mitre.org/ L34rn1ng! slmgr.vbs /rearm P4$$w0rd!

Smartphone managment

Time managment

https://hbr.org/2018/03/having-your-smartphone-nearby-takes-a-toll-on-your-thinking

Github

Version Control Systems

Business

Cibersecurity

https://www.ftc.gov/es/guia-para-negocios/protegiendo-pequenos-negocios/ciberseguridad

Bash

Linux

https://explainshell.com/

Java

Programmig Development

https://apprize.best/javascript/oca_2/13.html

Subnetting

Networking

https://ptgmedia.pearsoncmg.com/images/9780136582755/errata/SubnettingPracticeExercises_revised.pdf

Floating IPs

Networking

https://docs.paloaltonetworks.com/vm-series/9-1/vm-series-deployment/set-up-the-vm-series-firewall-on-oracle-cloud-infrastructure/configure-activepassive-ha-on-oci

Tools

Networking

NetCat https://ubidots.com/blog/how-to-simulate-a-tcpudp-client-using-netcat/

Introduction

Networking

Overview Networking OCI

Networking Introduction

     

IP, subnets and CIDR

Networking Introduction

  https://www.digitalocean.com/community/tutorials/understanding-ip-addresses-subnets-and-cidr-notation-for-networking#ipv4-addresses-classes-and-reserved-ranges     

IP tables

Networking

IP tables reference: https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/4/html/reference_guide/s2-iptables-options-commands

Python

Programmig Development

https://github.com/jpmorganchase/python-training 

Web development

Programmig Development

Pages for reference: http://www.awwwards.com/ 

8 MFI

Functional

All Slides https://drive.google.com/drive/folders/1hOvUtDLahfA9_1erDZc8jRyIfYH8PbwE  Dia 1 Jefrey Zuckerman Juramento hipocratico https://www.uv.es/~jaguilar/historias/jurhipo.html#:~:text=Guardar%C3%A9%20el%20m%C3%A1ximo%20respeto%20a,o%20experimental%...

Intro

Cibersecurity CEH

Basic cyber-security concepts Confidentiality: Only the allowed people can access the information Integrity: Data didn't change Availability: The information is available at any time   Authorization: Authentication:  Teams: Red team Attackers: Pen...

Oracle Cloud Infrastructure Foundations

Oracle

     

Getting Started with Oracle Cloud Infrastructure

Oracle