Sign in or
Welcome! This is a website that everyone can build together. It's easy!
Hello My name is Lokesh Bisht.
So first of all i want to introduce my self.
Basically i am interesting only for security concepts, still i am try to gather latest technologies and terms which can help me for my security knowledge. I have knowledge about following technologies:
4. CCNA Security
5. RHCE (Redhat Certified Eng)
9. Firewall Fundamentals
10. Linux Security and hacking Tools
11. Vulnerablitiy Auditors
Actually i am not familiar with Microsoft..i am always familiar with Linux because all the live cd which are work for hacking works on linux based. As well as i haven't follow cisco certification path but in future i will..i have knowledge about CCSP also..but just little bit..
Actually i wanna become as a security specilist..and i will..do....my next targets are:
Above courses are realted security and Hacking also.
Now about experience..i had worked with Rooman Technologies as a Technical Trainer (Cisco and Linux)..i was former Ethical Hacker Trainer (Security Evenglist) in TechPrudentia.
Now I am working with INDEBO INDIA Pvt.Ltd as a Linux System Administrator..now i am working on real servers.....i am creating security policies and server policies for INDEBO..as well as managing all users.
I am totally dedicated for Security/Hacking.....I love Security..Hacking....
So for security there are so certification...so choose your certification path...
This site is only for those persons who share knowledge about Security and Linux as well as Ethical Hacking also.
Now this site is new and i am trying to update regullary so i will be try that i will share my security knowledge with those people who want hacking as a professionally.
So be proude as indian.
Generally, hackers are unorganized but that doesn't mean we can't perform an analysis of hacking. The method we will use is one that was pioneered in World War II by the RAND coporation. If we try to understand hacking as an operations research problem then we can get it onto a firm, even mathematical foundation. The goal of the hacker is to maximize some set of stated goals (Theft, Revenge etc.) while at the same time minimizing his risk. The defender, on the other hand, is looking to amplify the the risk to the hacker while minimizing his exposure to potential abuse.
Consider making an assault on, say, Normandy or Kuwait, a hacker is presented with many of the same problems. How is he to maximize his chance of success while minimizing his risk. Each action he can perform is characterized by a signal that the defender may or may not be able to detect. Therefore, one of his goals must be to minimize the signal he sends to the defender. We caveat this statement because the attacker may decide that stealth costs too much and his real goal is better served by a frontal assault. Even so, this choice simply means that the defender recieves the signal at full strength right from the start so the same methods we outline for amplifying and detecting attack signals will apply.
Latest page update: made by Lokesh_Bisht
, Apr 21 2010, 1:36 AM EDT
(about this update
About This Update
Edited by Lokesh_Bisht
58 words added
42 words deleted
- complete history)
Keyword tags: IT Certification Path
More Info: links to this page
There are no threads for this page. Be the first to start a new thread.