Compute Engine Google Cloud Compute Engine: Service Accounts and Scopes Instance 1 - Read-Only Create a Compute Engine instance with a Storage
DNS Creating a Network Security Group with Inbound and Outbound Rules in Azure After you follow these steps, you will have a better understanding of
Database What are the several indicators of compromise(IOC) that organizations should monitor? * Unusual Outbound Network Traffic * HTML Response Sizes * Geographical Irregularities * Increases in Database
False Negative What is the difference between a false positive and false negative in IDS? * A false positive is considered to be a false alarm and false
Audit Ensuring Compliance with Azure Policies After this you will know how to create two common Azure objects,
IDS What is the difference between IDS and IPS? IDS is Intrusion Detection System and it only detects intrusions and the
Encryption What is the difference between Symmetric and Asymmetric encryption? Basis of ComparisonSymmetric EncryptionAsymmetric EncryptionEncryption keySame key for encryption & decryptionDifferent keys
ACK What is a three-way handshake process? It’s called three-way handshake because three segments are exchanged between the
Risk What is the difference between Threat, Vulnerability, and Risk? * Threat: Someone with the potential to cause harm by damaging or destroying
Metasploit Metasploit: Finding Password in Windows Password Hash File With the meterpreter shell session open meterpreter > hashdump The contents of
Required Studying Material to become a Azure Security Engineer Manage Identity and Access (20-25%) Configure Microsoft Azure Active Directory for workloads
Web Application Vulnerability Testing Checklist Need help combating vulnerabilities? Click here for the ultimate web application vulnerability