Sunday, September 29, 2013

1. Hacking Tutorials for Beginners - By
The tutorial contains useful posts to help beginners understand the ethics of hacking. It also provides security tips on avoiding adware, windows firewall, online shopping, spyware prevention and so on.
2. How to learn Ethical hacking - By
The site provides useful information on your devices, websites and assets. The site shows whether or not you’re hack proof.
3. Penetration Testing Tutorial - By
From here you can learn penetration testing, which is a type of security testing which helps you test the insecure areas of the system or application. It helps you learn Black Box Testing, White Box Penetration testing, and Grey Box Penetration Testing.
4. Backtrack Penetration Testing Tutorial
Backtrack Penetration Testing Tutorial is probably the best penetration testing distribution that provides some penetration testing programs that are used in this Backtrack Penetration Testing Tutorial.
5. Introduction to Penetration Testing
The current tutorial teaches you penetration testing, different types of vulnerabilities, security research, payloads, and so on. A useful resource for beginners!
6. Information Gathering with Nmap
The first tutorial to give you a basic walkthrough of a penetration testing! It focuses on information gathering, finding live hosts on the network, port scanning and versions of software that is running on those ports.
7. Simple How To Articles By Open Web Application Security
The tutorial contains numerous how to articles such as how to encrypt a properties file, how to meet verification reporting requirements, how to modify proxied conversations, how to perform a security architecture review at Level 1, how to perform a security architecture review at Level 2 and how to specify verification requirements in contracts, and so on.
8. The Six Dumbest Ideas in Computer Security
The tutorial describes what it considers six dumbest ideas in computer security starting from default permit, Enumerating Badness, Penetrate and Patch, Hacking is Cool, Educating Users, Action is Better Than Inaction , and so on.
9. Secure Design Principles
Understanding the basic principles puts you in a better position to execute particular practices where needed in your own projects. The principle of least privilege specifies that a user or computer program must be granted the least amount of privileges required to achieve a task. The tutorial describes all these principles for the users.
10. 10 steps to secure software The tutorial features some principles for developing secure software recommended by author and security analyst.

No comments:

Post a Comment