Daily Shaarli

All links of one day in a single page.

February 27, 2017

bostonlink/nwmaltego: Netwitness Maltego integration Project
thumbnail

NWmodule.py

nwmodule.py is a python module I wrote that interfaces with the Netwitness REST API. All Maltego transforms are dependent on this module and functions within it. It must ne within the directory that contains the Maltego transforms.

RSA Content - RSA Security Analytics Documentation

This space contains information about the RSA Content program for the RSA NetWitness Suite. It contains information on Rules, Reports, procedures, and meta related to content that is available on Live. The information in this space applies to all versions of Security Analytics (unless noted otherwise).

Certified Network Defender (CND) - EC-Council
thumbnail

Students enrolled in the Certified Network Defender course, will gain a detailed understanding and hands on ability to function in real life situations involving network defense. They will gain the technical depth required to actively design a secure network in your organization. This course gives you the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that you understand how networks operate, understand what software is automating and how to analyze the subject material.

RSA ESA Rules or Alerts | RSA Link

RSA NetWitness ESA Correlation Rules / Alerts available by default on the plateform

Freedom of Information Act Electronic Reading Room | CIA FOIA (foia.cia.gov)

Welcome to the Central Intelligence Agency's Freedom of Information Act Electronic Reading Room.

Do UFOs fascinate you? Are you a history buff who wants to learn more about the Bay of Pigs, Vietnam or the A-12 Oxcart? Have stories about spies always fascinated you? You can find information about all of these topics and more in the Central Intelligence Agency (CIA) Freedom of Information Act (FOIA) Electronic Reading Room.

Portail:Sécurité informatique — Wikipédia

La sécurité informatique est l'ensemble des moyens techniques, organisationnels, juridiques et humains nécessaires et mis en place pour conserver, rétablir, et garantir la sécurité des systèmes informatiques. Elle est intrinsèquement liée à la sécurité de l'information et des systèmes d'information.