Instalación y configuración de Centro de Respuesta a Incidentes (TheHive)
Helps users and administrators learn security processes and practices.
workstations and servers against local and remote intrusions, exploitation and malicious activities.
Focused on Blue team Enterprise Linux but detailing concepts and techniques valid for all Linux
systems, this guide details the planning and tools involved in creating a secure computing system.
environment for the data center, workplace and home. With adequate administrative knowledge,
surveillance and tools, systems running Linux can be fully functional and protected from most
common methods of intrusion and exploitation.
Mostrar más
Más información sobre quien creó el contenido