Bookory

  • +91-8287777457
Instagram Linkedin Youtube Whatsapp
IMG-20240225-WA0000
MoS Menu
  • Home
  • Free Resource Hub
  • Free Security Tools
    • Forensics Tools
    • Network Tools
    • GRC Tools
    • Incident Monitoring Tools
    • Vulnerability Scanning Tools
    • Miscellaneous Tools
  • Free Infographics
  • University
    • GRC Beginner
    • GRC Intermediate (ISO 27001)
    • GRC Expert (CISM)
    • SecTest Samurai (VAPT)
    • SecTest Wizard (VAPT)
    • CIPP(E)
    • CIPM
    • SOC 2
    • CISA
    • CISSP
    • ISO 42001
    • CCSP
  • My account
  • About Us
  • Blog
  • Contact
0 0.00₹
  • Home
  • Free Resource Hub
  • Free Security Tools
    • Forensics Tools
    • Network Tools
    • GRC Tools
    • Incident Monitoring Tools
    • Vulnerability Scanning Tools
    • Miscellaneous Tools
  • Free Infographics
  • University
    • GRC Beginner
    • GRC Intermediate (ISO 27001)
    • GRC Expert (CISM)
    • SecTest Samurai (VAPT)
    • SecTest Wizard (VAPT)
    • CIPP(E)
    • CIPM
    • SOC 2
    • CISA
    • CISSP
    • ISO 42001
    • CCSP
  • My account
  • About Us
  • Blog
  • Contact
Page 51
HomeAll BooksPage 51
Filter Filter
  • Sysmon

    Sysmon

    Sysmon, short for System Monitor, is a Windows system service and device driver that monitors and logs system activity to the Windows event log. Developed by Microsoft, Sysmon provides detailed information about process creations, network connections, and changes to file creation time. Security professionals often use Sysmon for enhanced visibility into system activities, aiding in threat detection and incident response.

    Visit Site
  • Taipan

    Taipan

    Taipan is a an automated web application scanner which allows to identify web vulnerabilities in an automatic fashion. This project is the core engine of a broader project which include other components, like a web dashboard where you can manage your scan or download a PDF report and a scanner agent to run on specific host.

    Visit Site
  • -100% Targeted risk analysis Guidance

    Targeted risk analysis Guidance

    1.00₹ Original price was: 1.00₹.0.00₹Current price is: 0.00₹.
    Add to cart
  • TCH Hydra

    TCH Hydra

    A free and open source “proof of concept” password cracker tool. THC Hydra is available for Windows, macOS, and Linux and supports protocols such as FTP, SMTP, and HTTP-GET.

    View Site
  • TCP Dump

    TCP Dump

    A free and open-source command-line network packet analyzer. Users can specify a particular filter to search for packets that match this description

    Visit Site
  • -100% Ten Traits A Ciso Can Learn From Dashavatara

    Ten Traits A Ciso Can Learn From Dashavatara

    1.00₹ Original price was: 1.00₹.0.00₹Current price is: 0.00₹.
    Add to cart
  • -100% The Complete Active Directory Security Handbook

    The Complete Active Directory Security Handbook

    1.00₹ Original price was: 1.00₹.0.00₹Current price is: 0.00₹.
    Add to cart
  • -100% The Cybersecurity Playbook

    The Cybersecurity Playbook

    1.00₹ Original price was: 1.00₹.0.00₹Current price is: 0.00₹.
    Add to cart
  • -100% The definitive guide to data classification

    The definitive guide to data classification

    1.00₹ Original price was: 1.00₹.0.00₹Current price is: 0.00₹.
    Add to cart
  • -100% The Game of Threat Hunting

    The Game of Threat Hunting

    1.00₹ Original price was: 1.00₹.0.00₹Current price is: 0.00₹.
    Add to cart
  • -100% The National Security Agency's Recommendations for Cloud Security

    The National Security Agency’s Recommendations for Cloud Security

    1.00₹ Original price was: 1.00₹.0.00₹Current price is: 0.00₹.
    Add to cart
  • -100% The New General Data Protection Regulation

    The New General Data Protection Regulation

    1.00₹ Original price was: 1.00₹.0.00₹Current price is: 0.00₹.
    Add to cart
  • Previous
  • 1
  • 2
  • 3
  • …
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • …
  • 56
  • 57
  • 58
  • Next
Search
Genre

All Books

Account

Search

All Tools

Are you graduate of any our program, click here to verify your certificate.

Click here

Subscribe for our newsletter

     GCAI INTERNATIONAL LLP 

    Harte Pete, #391, Bangalore, India Monday – Friday: 9:00-20:00 

    +91 8287777457      

    show on map

    hello@ministryofsecurity.co

    explore

    • My Account
    • About us
    • Contact Us
    • Privacy Policy
    • Terms & Conditions
    Copyright © 2024 Ministry of Security. All rights reserved.
    Sign in Create an Account

    Lost your password?
    • MoS Menu
    • MoS Menu
    • Home
    • Free Resource Hub
    • Free Security Tools
      • Forensics Tools
      • Network Tools
      • GRC Tools
      • Incident Monitoring Tools
      • Vulnerability Scanning Tools
      • Miscellaneous Tools
    • Free Infographics
    • University
      • GRC Beginner
      • GRC Intermediate (ISO 27001)
      • GRC Expert (CISM)
      • SecTest Samurai (VAPT)
      • SecTest Wizard (VAPT)
      • CIPP(E)
      • CIPM
      • SOC 2
      • CISA
      • CISSP
      • ISO 42001
      • CCSP
    • My account
    • About Us
    • Blog
    • Contact
    • Home
    • Free Resource Hub
    • Free Security Tools
      • Forensics Tools
      • Network Tools
      • GRC Tools
      • Incident Monitoring Tools
      • Vulnerability Scanning Tools
      • Miscellaneous Tools
    • Free Infographics
    • University
      • GRC Beginner
      • GRC Intermediate (ISO 27001)
      • GRC Expert (CISM)
      • SecTest Samurai (VAPT)
      • SecTest Wizard (VAPT)
      • CIPP(E)
      • CIPM
      • SOC 2
      • CISA
      • CISSP
      • ISO 42001
      • CCSP
    • My account
    • About Us
    • Blog
    • Contact
    HIDE FILTER
    All category
    • All category
    • All Books
      • Checklists
      • Cloud Security
      • DevSecOps
      • Exam Prep
      • GRC
      • Interview Prep
      • MoS Playbooks
      • Network Security
      • OT Security
      • Privacy
      • Reports
      • Security Monitoring
      • Security Testing
      • Templates
      • Uncategorized
    • All Tools
      • Forensics Tools
      • GRC Tools
      • Incident Monitoring Tools
      • Miscellaneous Tools
      • Network Monitoring Tools
      • Vulnerability Scanning Tools
    Shopping cart close