Programming

78 Pins
·
3d
the diagram shows how llms work and what they are used to make them look like
the linux file system diagram is shown in this graphic style, with several different types of data
Sketech (@SketechWorld) on X
Sketech (@SketechWorld) on X
#cybersecurity | Cyber Security News ® | 49 comments
#cybersecurity | Cyber Security News ® | 49 comments
a black and red flow map with many different types of information on the bottom right hand corner
Jamie Bridges on LinkedIn: Mapping active directory on an internal assessment brings a level of…
Jamie Bridges on LinkedIn: Mapping active directory on an internal assessment brings a level of…
two men standing next to each other with the words everyone else and security team
an info board showing different types of web pages
#bigdata #cloudcomputing #aws #azure #googlecloud | Hina Arora | 97 comments
an image of a computer screen with the text queue on it's side
Queue Data Structure
the linux web server comparison chart shows that there are many different types of servers in this area
Hacking in Cybersecurity
👇 Hacking in Cybersecurity
the defensive linux security wheel is shown
the architecture of netflix's logos
the 7 phases of a penemation testing process info sheet with instructions on how to use it
7 Phases of A Penetration Testing
Penetration testing, often referred to as ethical hacking, is a crucial process in cybersecurity aimed at evaluating the security posture of a system or network. It involves simulating a cyberattack to identify vulnerabilities and weaknesses that malicious actors could exploit. The process typically consists of seven distinct phases . #techprofree #Linuxkali #Penetrationtesting @Techprofree
the infosectrain types of scanning
Types of scanning
the linux boot process diagram is shown in this image, and shows how to use it
LinkedIn Login, Sign in | LinkedIn
(22) Feed | LinkedIn
how does vn tunneling work? infographical poster for cyberlinkin
#vpn #networksecurity #privacy #encryption #cyberawareness | Nasir Amin | 46 comments