Olá Tudo bem? Eu sou o Glauber Porto
Estudo CyberSegurança na ACADI-TI Acaditi e compartilho meu aprendizado no meu Linkedin ou no meu Blog - O Quinto Dominio
e Canal no Youtube
Já se inscreve, tua contribuição será muito bem vinda, vlw mesmo! 😉️
https://www.guiafoca.org/guiaonline/
https://pt.rakko.tools/tools/68/
https://readthedocs.org/dashboard/
Link: https://nvd.nist.gov/vuln/search
Exemplo de Pesquisa do Windows Server https://nvd.nist.gov/vuln/search/results?form_type=Basic&results_type=overview&query=Windows+Server&search_type=all&isCpeNameSearch=false
- Clique Aqui Para Matar Todo Mundo: Como sobreviver em um mundo hiperconectado
- Sandworm: Uma nova era na Guerra Cibernética e a caça pelos hackers mais perigosos do Kremlin
- Contagem Regressiva Até Zero Day
- Eterna vigilância: Como montei e desvendei o maior esquema de espionagem do mundo
- Fundamentos de Segurança da Informação: com base na ISO 27001 e na ISO 27002
- Gestão da Segurança da Informação - Uma Visão Executiva
- Information Security Management - An Executive View
- Segurança Digital - Proteção de Dados nas Empresas
- Hacking: The Art of Exploitation, 2nd Edition (English Edition)
- Social Engineering: The Science of Human Hacking (English Edition)
- UNHACKABLE : Your Online Security Playbook: Recreating Cyber Security in an Unsecure World (English Edition)
- CYBERSECURITY INCIDENT MANAGEMENT MASTERS GUIDE: Volume 1 - Preparation, Threat Response, & Post-Incident Activity (Cybersecurity Masters Guides) (English Edition)
- The CERT Guide to Insider Threats: How to Prevent, Detect, and Respond to Information Technology Crimes (Theft, Sabotage, Fraud) (SEI Series in Software Engineering) (English Edition)
- Online Danger: How to Protect Yourself and Your Loved Ones from the Evil Side of the Internet (English Edition)
- Cyber Minds: Insights on cybersecurity across the cloud, data, artificial intelligence, blockchain, and IoT to keep you cyber safe (English Edition)
- Cybersecurity Threats, Malware Trends, and Strategies: Learn to mitigate exploits, malware, phishing, and other social engineering attacks (English Edition)
- The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data (English Edition)
- Cyber Crisis: Protecting Your Business from Real Threats in the Virtual World (English Edition)
- Cybersecurity – Attack and Defense Strategies: Counter modern threats and employ state-of-the-art tools and techniques to protect your organization against ... 2nd Edition (English Edition)
- Guerra Cibernética. A Próxima Ameaça à Segurança e o que Fazer a Respeito
- Tribe of Hackers: Cybersecurity Advice from the Best Hackers in the World
- Cybersecurity Is Everybody's Business: Solve the Security Puzzle for Your Small Business and Home (English Edition)
- Messing with the Enemy: Surviving in a Social Media World of Hackers, Terrorists, Russians, and Fake News
- Cybersecurity: An Essential Guide to Computer and Cyber Security for Beginners, Including Ethical Hacking, Risk Assessment, Social Engineering, Attack ... and Cyberwarfare
- The Hacker Playbook 3: Practical Guide To Penetration Testing
- Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
- Os Arquivos Snowden: A História Secreta do Homem mais Procurado do Mundo
- IT Risk: Turning Business Threats into Competitive Advantage
- Cybersecurity and Third-Party Risk: Third Party Threat Hunting
- Cybersecurity: The Beginner's Guide
- Cybersecurity and Third-Party Risk: Third Party Threat Hunting
- Cybersecurity Career Master Plan: Proven techniques and effective tips to help you advance in your cybersecurity career
- The Art of Invisibility: The World's Most Famous Hacker Teaches You How to Be Safe in the Age of Big Brother and Big Data
- Ciso Compass: Navigating Cybersecurity Leadership Challenges with Insights from Pioneers
- CISO Desk Reference Guide: A Practical Guide for CISOs: 1
- CISO Desk Reference Guide Volume 2: A Practical Guide for CISOs
- CISO Desk Reference Guide: A Practical Guide for CISOs (English Edition)
- Segurança Em Redes Informáticas - 6.ª Edição Atualizada E Aumentada
01 - https://breachlevelindex.com 01a - https://haveibeenpwned.com 02- https:/shodan.io 03 - https://securityweekly.com/ 04 - https://securityboulevard.com 05 - https://nakedsecurity.sophos.com/ 06 - http://www.digitalattackmap.com/ 07 - https://osintframework.com/ 08 - http://cve.mitre.org 09 - https://securelist.com/ 10 - https://threatpost.com/
Programação Shell Linux: Referência Definitiva da Linguagem Shell: https://amzn.to/3ROcZ6W
Linux - A bíblia: o mais abrangente e definitivo guia sobre Linux: https://amzn.to/3Opryep
Guia Completo do Linux e Software Livre: https://amzn.to/3zkEde9
Comandos Linux - 1: https://amzn.to/3B6BOW2
Guia Para Iniciantes Em Hacking de Computadores: Como Hackear Redes Sem Fio, Segurança Básica E Testes De Penetração, Kali Linux, Seu Primeiro Hack: https://amzn.to/3OiERx3