Pentesting Fundamentals TryHackMe

  1. Telecommunications (phones, VoIP, etc.)
  2. Wired Networks
  3. Wireless communications
  • Data security
  • System security
  • Identity and access control
  • Resiliency
  • Monitoring
  • Response and recovery planning

--

--

--

CTF player | Cyber Security Enthusiast |CEH-11

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

The Sale that Brings Token Benefits to Everyone

Apple Still Won’t Help the FBI Break Into iPhones. Good.

Privacy policy

{UPDATE} 寶藏獵人(盜墓筆記) Hack Free Resources Generator

FATExDAO Update — Time to buck up…

5 Year Anniversary of the SoakSoak Malware Tsunami

{UPDATE} laserDRAW Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Mohammadaassif

Mohammadaassif

CTF player | Cyber Security Enthusiast |CEH-11

More from Medium

Let’s learn WebApp Pentest from basic on DVWA. From setup to hack. Part 1.

TryHackMe Notes: Vulnerabilities 101

CVSS Pros and Cons. See more here https://tryhackme.com/room/vulnerabilities101

HackTheBox Pandora Write-Up

Some useful web pen-testing tools