Skip to content
  • Thursday 9th February 2023
    • Medium

    Patch The Net

    One node at a time

    • Linux
    • Web Application Security
    • Red Teaming
    • CISSP Prep

    Category: CISSP Summary

    • CISSP Prep
    • CISSP Summary

    CISSP Domain 8 Review – Software Development Security

    This post serves as a review for the domain 8 of the CISSP. This domain covers the software development security. Before we start, here is a list that will help […]

    View the post
    A. BoukarDecember 25, 2020December 27, 2020
    Tags: Application securityCISSPDatabase securityDomain 8Software Development Security
    • CISSP Prep
    • CISSP Summary

    CISSP Domain 7 Review – Security Operations

    This post serves as a review for the domain 7 of the CISSP. This domain covers security operations. Before we start, here is a list that will help you navigate […]

    View the post
    A. BoukarDecember 25, 2020December 27, 2020
    Tags: CISSPDomain 7EvidenceIncident ManagementInvestigationsSecurity Operations
    • CISSP Prep
    • CISSP Summary

    CISSP Domain 6 Review – Security Testing

    This post serves as a review for the domain 6 of the CISSP. This domain covers security testing. Before we start, here is a list that will help you navigate […]

    View the post
    A. BoukarDecember 24, 2020December 27, 2020
    Tags: CISSPDomain 6Penetration testingSecurity TestingVulnerability scanning
    • CISSP Prep
    • CISSP Summary

    CISSP Domain 5 Review – Identity and Access Management

    This post serves as a review for the domain 5 of the CISSP. This domain covers identity and access . Before we start, here is a list that will help […]

    View the post
    A. BoukarDecember 24, 2020December 27, 2020
    Tags: Access ControlCISSPdomain 5Identity and access management
    • CISSP Prep
    • CISSP Summary

    CISSP Domain 4 Review – Communication and Network Security

    This post serves as a review for the domain 4 of the CISSP. This domain covers communication and network security. Before we start, here is a list that will help […]

    View the post
    A. BoukarDecember 24, 2020December 28, 2020
    Tags: CISSPCommunicationDomain 4NetworkSecurity
    • CISSP Prep
    • CISSP Summary

    CISSP Domain 3 Review – Security Architecture and Engineering

    This post serves as a review for the domain 3 of the CISSP. This domain covers security architecture and engineering. Before we start, here is a list that will help […]

    View the post
    A. BoukarDecember 23, 2020December 28, 2020
    Tags: CISSPDomain 3ReviewSecurity Architecture and Engineering
    • CISSP Prep
    • CISSP Summary

    CISSP Domain 2 Review – Asset Security

    This post serves as a review for the domain 2 of the CISSP. This domain covers asset security. Before we start, here is a list that will help you navigate […]

    View the post
    A. BoukarDecember 23, 2020April 27, 2022
    Tags: Asset SecurityCISSPDomain 2ReviewSummary
    • CISSP Prep
    • CISSP Summary

    CISSP Domain 1 Review – Security and Risk Management

    This post serves as a review for domain 1 of the CISSP. This domain covers security and risk management. Before we start, here is a list that will help you […]

    View the post
    A. BoukarDecember 22, 2020April 26, 2022
    Tags: CISSPDomain 1ReviewSecurity and Risk ManagementSummary

    Latest Articles

    • netcal-for-bind-and-reverse-shell
      April 18, 2022December 25, 2022A. Boukar

      Create Bind and Reverse Shells using Netcat

    • SSRF Explained
      April 8, 2022April 8, 2022A. Boukar

      Server-Side Request Forgery (SSRF) Explained

    • Host Header Injection Attack
      February 5, 2022December 25, 2022A. Boukar

      Host Header Injection Attacks

    • http request smuggling attack
      December 31, 2021December 25, 2022A. Boukar

      HTTP Request Smuggling Explained

    • XXE
      December 12, 2021December 25, 2022A. Boukar

      XXE Attacks Explained

    Newsletter

    Recent Posts

    • Create Bind and Reverse Shells using Netcat
    • Server-Side Request Forgery (SSRF) Explained
    • Chapter 12 – Bash Scripting
    • Host Header Injection Attacks
    • HTTP Request Smuggling Explained
    Copyright All rights reserved - Patchthenet.com
    • Medium