
MS Azure 애저 클라우드 서비스 구축 이해와 보안
보안프로젝트
IT 서비스가 클라우드 환경으로 빠르게 전환되고 있습니다. MS 애저 클라우드 환경 보안을 위해 알아야 할 기본적인 가상 인프라 구축부터, 각 영역별 서비스 운영, 모니터링 이해, 보안 영역까지 담았습니다.
초급
Azure
Many security hacking incidents are occurring by utilizing OSINT (Open Source Intelligence) search services. We will discuss how to utilize it to first monitor and eliminate potential security threats from an offensive perspective before an attack occurs.
Security Threat Monitoring Using OSINT
Utilizing Shodan services and Python APIs
Using Censys and Python API
Anyone who wants to use OSINT in hacking techniques
Potential threat monitoring is also OK!
Tips for responding to security breaches in practice.
Using Open Intelligence Service (OSINT)
This is a lecture on utilizing security monitoring and Python API.
Many security breaches are occurring through the use of Open Source Intelligence (OSINT) search services . This article discusses how to utilize OSINT to proactively monitor and eliminate potential security threats from an offensive perspective before an attack occurs.
Open search services are increasingly being utilized in mock hacking, breach response, and regular security activities. Regular monitoring is essential for unnecessary port access. If services connected to open ports exhibit inadequate access control, default account settings, or inadequate management of the administrator page, criminals can pose a serious security threat to internal systems.
Open source intelligence (OSINT) refers to information obtained from publicly available sources. It is also called open source intelligence, public information, public information, open source information, or open source intelligence.
The types of intelligence collected by national intelligence agencies like the CIA and private intelligence companies include human intelligence (HUMINT), signals intelligence (SIGINT), imagery intelligence (IMINT), measured intelligence (MASINT), open-source intelligence (OSINT), and technical intelligence (TECHINT). While the CIA originally focused on HUMINT, the importance of TECHINT has grown significantly with the advancement of computers. (Wikipedia)
This course covers Shodan, Censys, and other leading OSINT search services . It also covers the process of developing Python programs using the provided APIs. Being able to create your own search and monitoring tools in Python will enable you to conduct effective security monitoring activities .
Please make sure to check before learning!
History
published books
Who is this course right for?
Those who have chosen the mock hacking career path
Anyone who wants to apply OSINT to breach incident analysis and response
Anyone who wants to learn the basics of OSINT
Anyone who wants to develop security using Python API
For those of you who are curious about how cybercriminals are leveraging OSINT
Need to know before starting?
Security Terms
Security Hacking Interest
Python Basics
100,584
Learners
3,028
Reviews
443
Answers
4.7
Rating
67
Courses
보안프로젝트 ( www.boanproject.com )는 IT보안, 빅데이터, 머신러닝, IoT 등 다양한 분야의 온라인 강의, 그룹 강의를 진행하고 있습니다.
All
55 lectures ∙ (8hr 43min)
Course Materials:
Limited time deal ends in 16:35:25
$41,250.00
25%
$42.90
Check out other courses by the instructor!
Explore other courses in the same field!