Log In
Or create an account -> 
Imperial Library
  • Home
  • About
  • News
  • Upload
  • Forum
  • Help
  • Login/SignUp

Index
CYBERSECURITY The Ultimate Beginners Guide to Learn and Understand Cybersecurity Measures Effectively Introduction Chapter 1: Types of Cybersecurity Chapter 1: Types of Cybersecurity Chapter 2: Cyber Threats Chapter 2: Cyber Threats
Malware
Chapter 3: Careers in Cybersecurity Chapter 3: Careers in Cybersecurity
Jobs in the field
Chapter 4: Personal Cybersecurity Chapter 4: Personal Cybersecurity
Start off on the right foot Tips for publishing content on the internet
Chapter 5: Cybersecurity Protection and Practices Chapter 5: Cybersecurity Protection and Practices
Protecting your portable devices Ensure your data is secure Additional tips for smartphones Other security tips to follow Keeping children safe
Conclusion CYBERSECURITY The Utmost Intermediate Course Guide in the Fundamentals and Concept of Cybersecurity Introduction Chapter 1: Cyberspace in Context Chapter 1: Cyberspace in Context
The four layers of cyberspace Overlapping systems of communication Primary characteristics
Chapter 2: Computer and Network Security Chapter 2: Computer and Network Security
Network security Computer security Failed security Identity theft Top data breaches The dark web
Chapter 3: Confidentiality, Integrity, and Availability Chapter 3: Confidentiality, Integrity, and Availability
Confidentiality Eavesdropping Phishing Integrity Availability Offensive methods used by hackers Ransomware
Chapter 4: Securing a Wireless Network Chapter 4: Securing a Wireless Network
Encryption WPA Wireless router credentials Service Set Identifier Media Access Control Summary
Chapter 5: Securing Mobile Devices Chapter 5: Securing Mobile Devices
Security risks The basics Summary
Chapter 6: Social Media Safety Chapter 6: Social Media Safety
Giving out information Customize your privacy options Use two-factor authentication Further uses for social media accounts Keeping kids safe on social media
Chapter 7: The Future of Cybersecurity Chapter 7: The Future of Cybersecurity Chapter 8: Internet Vocabulary Chapter 8: Internet Vocabulary
Application server ASP (Application Service Provider) Bandwidth Broadband Byte Cookie Ethernet Extranet Gateway HTML (Hypertext markup language) HTTP (Hypertext Transfer Protocol) Intranet Java JavaScript LAN (Local Area Network) Proxy server Spyware URL (Uniform Resource Locator)
Conclusion Resources CYBERSECURITY The Advance Guide in System Security and Defense Strategies in Cybersecurity Introduction Chapter 1: Cybersecurity and Advanced System Security Chapter 1: Cybersecurity and Advanced System Security
Introduction to Cybersecurity Physical Security The World Without Cybersecurity The Nature of Threats Internet of Things Botnet
Chapter 2: Establishing a Risk Management Framework Chapter 2: Establishing a Risk Management Framework
Establishing a Risk Management Framework Process Different Maturity Objectives Evaluating the current capabilities Benefits of Achieving Cybersecurity Planning Maturity
Chapter 3: Addressing Process Risks Chapter 3: Addressing Process Risks
Operational Risks Enforcement of Access Control, Logging, and Monitoring Disposal or Redeployment of the Assets Control, Monitor and Log the Access to the Assets Incident Handling Conducting Vulnerability Assessments Contingency Planning
Chapter 4: People and Policy Risks Chapter 4: People and Policy Risks
Managing Risk from the Insider Threat Implementation of Effective Protective Monitoring Mitigating Risk with Security Policy Considering Security Policy Development as a Process
Chapter 5: Data Manipulation Concerns Chapter 5: Data Manipulation Concerns
Espionage Cloud Concerns Tackling Cloud Cybersecurity Problems
Chapter 6: Addressing Technology Risks Chapter 6: Addressing Technology Risks
Network Issues Limitation of Client Relegated Gadgets to Particular Network Sections Stream of Electronic Correspondence Firewall Insurance of Information in Travel
Conclusion HACKING The Ultimate Beginner’s Guide to Learn and Understand Hacking Effectively Introduction Chapter 1: The Basics of Hacking Chapter 1: The Basics of Hacking
Different types of hackers What skills do I need to start hacking? Different attack types
Chapter 2: Doing a Penetration Test Chapter 2: Doing a Penetration Test
Why should I do a penetration test? Writing these reports
Chapter 3: Gaining Physical Access to the System Chapter 3: Gaining Physical Access to the System
What vulnerabilities am I dealing with? Creating a plan Adding some physical controls Technical controls
Chapter 4: Getting the Passwords You Need Chapter 4: Getting the Passwords You Need
Vulnerabilities that come with passwords How to complete a password hack
Chapter 5: Social Engineering Chapter 5: Social Engineering
Strategies for social engineering Gaining trust Phishing Spamming How to avoid these attacks
Chapter 6: Completing a Wireless Network Attack Chapter 6: Completing a Wireless Network Attack
WLAN attacks How to verify a wireless network WEP WAP How to do a spoofing attack How to secure your wireless network
Chapter 7: How a Keylogger Can Help You Chapter 7: How a Keylogger Can Help You
Logging the keystrokes
Conclusion HACKING The Utmost Intermediate Course Guide in the Concepts and Fundamentals of Hacking Introduction to Hacking Chapter 1: The Fundamentals of Hacking Chapter 1: The Fundamentals of Hacking Chapter 2: Internet versus Intranet Chapter 2: Internet versus Intranet Chapter 3: Remote Access and the Extranet Chapter 3: Remote Access and the Extranet Chapter 4: The Concepts of Hacking – White Hat Hacking vs Black Hat Hacking Chapter 4: The Concepts of Hacking – White Hat Hacking vs Black Hat Hacking Chapter 5: Pentesting, Footprinting, and Scanning Chapter 5: Pentesting, Footprinting, and Scanning Chapter 6: Enumeration and System Hacking Chapter 6: Enumeration and System Hacking Chapter 7: Sniffing Traffic – Programs to Use and Benefits Chapter 7: Sniffing Traffic – Programs to Use and Benefits Conclusion
  • ← Prev
  • Back
  • Next →
  • ← Prev
  • Back
  • Next →

Chief Librarian: Las Zenow <zenow@riseup.net>
Fork the source code from gitlab
.

This is a mirror of the Tor onion service:
http://kx5thpx2olielkihfyo4jgjqfb7zx7wxr3sd4xzt26ochei4m6f7tayd.onion