Skip to content
  • Mon. May 12th, 2025

51 Security

Learning, Sharing, Creating

  • Sitemap
  • NET
    • AI
    • Azure
    • Cisco
    • Cloud
    • Docker
    • F5
    • Juniper
    • Network
    • Vmware
  • SEC
    • Checkpoint
    • CyberArk
    • Fortigate
    • IBM Guardium
    • Palo Alto
    • Security
    • Symantec
    • Thycotic
    • VPN
    • Vulnerability Scan
  • IT
    • Architecture
    • Linux
    • Python
    • Raspberry Pi
    • SIEM
    • Software
    • Threat Hunting
    • Windows
    • Wireless
  • Others
    • All Sites
    • Blog Related
    • Contact Us
    • IT Pro Sec
    • Other Topics
    • Partner
    • About 51Sec
  • Forum
  • Store
    • Shop
    • Cart
    • Checkout
    • My account

Latest Post

Webvm Project – Running A Linux VM in Your Browser (No VPS, No Server) CEHv13 Notes – Module 02: Footprinting and Reconnaissance Underdefense MAXI Platform Understanding TCPDUMP Output Microsoft Defender for Endpoint (MDE) Deployment and Configuration Steps with Security Policy Details
Categories
AI (8) Architecture (29) Azure (23) Blog (27) Checkpoint (80) Cisco (72) Cloud (105) CyberArk (61) Docker (59) F5 (11) Fortigate (24) Free (10) Guardium (18) Juniper (60) Linux (43) Network (55) Others (12) Palo Alto (8) Partner (11) Python (3) Raspberry Pi (8) Security (75) SIEM (27) Software (50) Symantec (14) Threat Hunting (26) Thycotic (21) Uncategorized (2) Vmware (21) VPN (47) Vulnerability Scan (19) Windows (18) Wireless (6)
Recent Posts
  • Webvm Project – Running A Linux VM in Your Browser (No VPS, No Server)
  • CEHv13 Notes – Module 02: Footprinting and Reconnaissance
  • Underdefense MAXI Platform
  • Understanding TCPDUMP Output
  • Microsoft Defender for Endpoint (MDE) Deployment and Configuration Steps with Security Policy Details
  • Kali Tools Usage (proxychain, tor, discover, nmap, msf, sgpt, etc)
Recent Comments
  • Tenable PCI Scans – 51 Security on Tenable Vulnerability Management Specialist – Discovery, Assessment, Analysis, Compliance, Dashboard, Reports, Core, Nessus, Agent, NNM, Access Control
  • Chris on How to Upgrade Windows 10 Evaluation Version to Full Version
  • netsec on Methods to Renew Microsoft 365 Developer Subscription
  • developer on Methods to Renew Microsoft 365 Developer Subscription
  • philip on Install WSA (Windows Subsystem for Android) and Android Apps In Windows 11 W/O Amazon Appstore
  • Sudhanshu Shekhar on CyberArk 12.1 Lab – 5. PSM Installation
Archives
  • RSS - Posts
  • RSS - Comments
51Sec Sites
51sec Sites 51sec Navigation

51sec OneDrive 51sec Google Drive
VPN Recommendation: Best VPN With Great Discount
Please enable / Bitte aktiviere JavaScript!
Veuillez activer / Por favor activa el Javascript![ ? ]
Security

CIS CAT Pro Installation and Configuration for CIS Benchmark Assessment

2022-12-23 netsec

The CIS Benchmarks are a powerful set of best practices to help your organization ensure its IT systems, software, networks, and cloud infrastructure are securely configured. Testing those configurations can…

Security

CIS-Hosted Controls Self Assessment Tool (CIS CSAT) to Track & Prioritize Your CIS Controls Implementation

2022-12-23 netsec

There are two versions of CIS CSAT: Pro and Hosted. Here are some of their introuductions: CIS CSAT Pro: CIS CSAT Pro is the on-premises version of the tool and…

Python

Running Python Script in Heroku

2022-12-23 netsec

This post is to summarize some related information I found online when I was trying to put a python script into heroku to run.

Azure Cloud

Monitor Large Amounts of DATA Movements in Azure Storage Account File Shares

2022-12-23 netsec

Azure Monitor Collect, analyze, and act on telemetry data from your cloud and hybrid environments. Azure Monitor supports your operations at scale by helping you maximize the performance and availability…

Threat Hunting

Register Free Qualys Community Edition For Your Own Cloud Vulnerability Scan

2022-12-23 netsec

Qualys Community Edition is a free version of the Qualys Cloud Platform designed for the security community. Discover IT assets. Manage vulnerabilities. Scan web apps. Inventory cloud assets.

Vulnerability Scan

Register Free Nessus Scanner Essentials and Execute a Vulnerability Scan

2022-12-23 netsec

Nessus is built from the ground-up with a deep understanding of how security practitioners work. Every feature in Nessus is designed to make vulnerability assessment simple, easy and intuitive. The…

Azure Cloud

Enable MFA for Azure AD Users

2022-12-23 netsec

Azure Active Directory (Azure AD) Multi-Factor Authentication helps safeguard access to data and applications, providing another layer of security by using a second form of authentication. Organizations can enable multifactor…

Security

Barracuda CloudGen Firewall F12 Initial Configuration

2022-12-23 netsec

This post is going to show a basic initial configuration for Barracuda CloudGen Firewall F12.

Vmware

Connect VMs in VMWare Workstation & Hypwe-V to Same Network When Both are on Same Windows Host

2022-12-23 netsec

In my lab environment, I am havng a Windows host which enabled Hyper-V, also installed VMWare workstation. It was very confusion when I tried to put both Hyper-V machines and…

Architecture

Microsoft Threat Modeling Tool – STRIDE – Usage and Examples

2022-12-23 netsec

The Threat Modeling Tool is a core element of the Microsoft Security Development Lifecycle (SDL). It allows software architects to identify and mitigate potential security issues early, when they are…

Security

Gartner Magic Quadrant for Privileged Access Management (2020, 2018)

2022-12-23 Jon

Gartner defines the privileged access management (PAM) market as tools that “discover, manage and govern privileged accounts on multiple systems and applications; control access to privileged accounts, including shared and…

Software

Website Load Testing Tools

2022-12-23 netsec

There are many Website Load Testing applications, here are some I recently tested. This post is to simply record some screenshots and steps I were using them.

Posts pagination

1 … 14 15 16 … 82

You missed

Linux

Webvm Project – Running A Linux VM in Your Browser (No VPS, No Server)

2025-03-21 netsec
Threat Hunting

CEHv13 Notes – Module 02: Footprinting and Reconnaissance

2025-03-21 netsec
Threat Hunting

Underdefense MAXI Platform

2025-03-21 netsec
Network

Understanding TCPDUMP Output

2025-03-21 Jon
Top Posts
  • CEHv13 Notes - Module 02: Footprinting and Reconnaissance
  • Free Software Across the Great Firewall (免费翻墙软件)
  • How to Get a Free Temporary Windows Virtual Machine in the Cloud
  • Checkpoint Standby Cluster Member Interface Not Reachable
  • CyberArk PAS Installation - Part 5 - PTA
NetSec YouTube Channel

51 Security

Learning, Sharing, Creating

Proudly powered by WordPress | Theme: Newsup by Themeansar.

  • Home
  • About Site
  • Cart
  • Checkout
  • Contact Us
  • Forum
  • My account
  • Partner
  • Shop
  • Sitemap
x