
Tcpdump Zero to Hero, Part1 commands & options
In this article, I will delve into one of the most indispensable tools in my networking arsenal: tcpdump. While mastering

In this article, I will delve into one of the most indispensable tools in my networking arsenal: tcpdump. While mastering

Location Dubai, UAE Date 7 March 2022 Organizer Abdulla Al Ghurair Foundation Level Entry Duration 4 Hours About I had

Introduction VMware ESXi stands out as a premier type-1 hypervisor, designed to facilitate virtualization by permitting numerous virtual machines to

Google has taken the next step towards a Passwordless future by announcing the arrival of passkeys. Passkeys are a new cryptographic key solution that

Introduction Recently, a shocking revelation has surfaced: the source code for Twitter, the popular microblogging platform, was leaked on GitHub,

Unfortunately, one of the common mistakes in network design is the lack of sufficient understanding of how networks operate. This

Location Turkey Date May 4 2022 Organizer ASSIAD Level Entry Duration 4 Hours About As part of our ongoing commitment

On May 7, the American company Colonial Pipeline stopped its work process due to a cyberattack initiated by ransomware. The

Introduction In recent times, the cybersecurity landscape has witnessed a significant uptick in malicious activities, particularly through email phishing attacks.

In this article, I will delve into one of the most indispensable tools in my networking arsenal: tcpdump. While mastering

Location Dubai, UAE Date 7 March 2022 Organizer Abdulla Al Ghurair Foundation Level Entry Duration 4 Hours About I had

Introduction VMware ESXi stands out as a premier type-1 hypervisor, designed to facilitate virtualization by permitting numerous virtual machines to

Google has taken the next step towards a Passwordless future by announcing the arrival of passkeys. Passkeys are a new cryptographic key solution that

Introduction Recently, a shocking revelation has surfaced: the source code for Twitter, the popular microblogging platform, was leaked on GitHub,

Unfortunately, one of the common mistakes in network design is the lack of sufficient understanding of how networks operate. This

Location Turkey Date May 4 2022 Organizer ASSIAD Level Entry Duration 4 Hours About As part of our ongoing commitment

On May 7, the American company Colonial Pipeline stopped its work process due to a cyberattack initiated by ransomware. The

Introduction In recent times, the cybersecurity landscape has witnessed a significant uptick in malicious activities, particularly through email phishing attacks.