Pablo Gallardo

Pablo Gallardo

Cybersecurity and IT professional. Find more info at pmgallardo.com

Cybersecurity Attack Phases

According to EC-Council EC-Council identify in the CEH course 5 hacking phases: Reconnaissance Scanning Gaining Access Maintaining Access Clearing Tracks According to ISACA ISACA identify 8 phases in a cybersecurity generalized attack processs: Perform reconnaissance Create attack tools Deliver malicious…

Google Advance Search Tags

The exploit of these tags on cybersecurity (what is called ‘Google Hacking’) is documented in Exploit database in the section Google Hacking Database (GHDB). Google Advance Search Tags [cache:] [link:] [related:] [info:] [site:] [allintitle:] [intitle:] [allinurl:] [inurl:] [location:] [filetype:]  …

Book Self-publishing Providers

Kindle Direct Publishing (KDP) USA Lulu USA Lulu distributes print books to Amazon, Barnes & Noble, the Ingram network, and more, including its own Lulu Bookstore. Commission: for each customer purchase, Lulu takes a commission of 20% of…

ISACA Cybersecurity Nexus

Cybersecurity Nexus (CSX) is a training and credentialing program related to cybersecurity and develop by the professional association ISACA. It consists of a series of certificates: CSX Fundamentals (CSX-F) Certificate CSX Foundations Certificate, is awarded automatically when the candidate achieves:…