The Beginner’s Guide to the Internet Underground
This Internet Underground short ebook covers the basics of anonymity, hactivism, & hidden parts of the Internet underground, along with some of the things you may find there. Many are still unaware what is available through the Tor network; from assassination hit lists to illegal drug dealing to weapons trade, you can still find it there. This is the beginning PDF and part of the free Introduction to IT Security and Computer Forensics MiniCourse.
[download]Download the FREE eBook HERE[/download]
Uh-oh!
We've encountered a new and totally unexpected error.
Get instant boot camp pricing
Thank you!
A new tab for your requested boot camp pricing will open in 5 seconds. If it doesn't open, click here.
Jeremy Martin
Jeremy Martin is a Senior Security Researcher that has focused his work on Red Team penetration testing, Computer Forensics, and Cyber Warfare. Starting his career in 1995, Mr. Martin has worked with Fortune 200 companies and Federal Government agencies. He has received numerous of awards for service. He has been teaching Advanced Ethical Hacking, Computer Forensics, Data Recovery, SCADA/ICS security, Security Management (CISSP/CISM), and more since 2003.
As a published author he has spoken at security conferences around the world. Current research projects include SCADA security, vulnerability analysis, threat profiling, exploitation automation, anti-forensics, and reverse engineering malware. You can find more of Jeremy’s writings & services at http://www.informationwarfarecenter.com
- The Beginner’s Guide to the Internet Underground
- Python for network penetration testing: an overview
- Python for exploit development: common vulnerabilities and exploits
- Python for exploit development: all about buffer overflows
- Python language basics: understanding exception handling
- Python for pentesting: programming, exploits and attacks
- How to run containers securely
- Increaseing security by hardening the CI/CD build infrastructure
- The pros and cons of public vs internal container image repositories
- CI/CD container security considerations
- Vulnerability scanning inside and outside the container
- How Docker primitives secure container environments
- Top 4 Zapier security risks
- Common container misconfigurations and how to prevent them
- Building container images using Dockerfile best practices
- Securing containers using Docker isolation
- Introduction to container security
- Top 8 Microsoft Teams security issues
- Analysts predict CEOs will be personally liable for security incidents. Should they be?
- Installing and Configuring CentOS 8 on Virtualbox [updated 2021]
- Cybersecurity Predictions For 2021
- Top 6 JavaScript plugin security risks
- Security tool investments: Complexity vs. practicality
- Data breach vs. data misuse: Reducing business risk with good data tracking
- Key findings from the 2020 Netwrix IT Trends report
- Fake Image Detection
- Reactive vs. proactive security: Three benefits of a proactive cybersecurity strategy
- Implementing a zero-trust model: The key to securing microservices
- How to create a subdomain enumeration toolkit
- Are open-source security tools secure? Weighing the pros and cons
- Understanding DoS attacks and the best free DoS attacking tools [Updated for 2020]
- How to verify and respond to vulnerability reports from security researchers
- 8 Best WordPress Security Plugins
- DNS security best practices: Preventing DNS hijacking, poisoning and redirection
- Top 7 cybersecurity books for IT auditors in 2020
- How to satisfy the blog post duplication process
- Top 16 cybersecurity websites: Cybersecurity forums, subreddits for IT and security professionals and more
- 10 election security predictions for the 2020 US presidential election
- DevOps, SecOps, DevSecOps, PrivacyOps & AIOps: What’s the difference?
- Secure process for auditing the posts that are labeled for blogs!
- National Counterintelligence and Security Center: 5 priorities for 2020
- Physical Access Control
- Securing Cookies with HttpOnly and secure Flags [Updated 2020]
- Bypassing security products via DNS data exfiltration
- Coronavirus predictions: What are the long-term workplace implications of COVID-19?
- Are there any new cybersecurity threats that come with 5G technology?
- New Cisco report: SMB security posture catches up to enterprise counterparts
- Critical security concerns for the education industry
- Cookies: An overview of associated privacy and security risks
- All My Stripes: The New Business Imperative of LGBTQ+ Inclusion
- How to get promoted in a cybersecurity career