Infosec - Infographics


Introduction

Here you can find all the infographics I have done, in any area of Infosec. I will update this section regularly.
You can use them for your tweets, for your classes, for whatever you want (except for the bad things).
The only requirement is to quote my Twitter (@Guillaume_Lpl). I prefer to clarify because some people have already plagiarized my work ...
Thank you for your sharing, I hope it will be useful! Feel free to come regularly, I will add new infographics based publications.



If you like the content of my articles and want to be aware of the publication of my new articles, if you want to contact me, or other:

Do not hesitate to follow me on Twitter --> twitter(@Guillaume_Lpl)

Index

The most useds tools in Infosec

tools infosec

tools infosec

For ReTweet, it's here → I would RT this (Thank you in advance for the visibility and support you bring me)



Some good tools useds for OSINT

osint tools

osint tools

For ReTweet, it's here → I would RT this (Thank you in advance for the visibility and support you bring me)



Some good tools useds for Forensic Analysis

forensic tools

forensic tools

For ReTweet, it's here → I would RT this (Thank you in advance for the visibility and support you bring me)



Some good tools useds for Mobile APP Pentest

mobile app security tools

mobile app security tools

For ReTweet, it's here → I would RT this (Thank you in advance for the visibility and support you bring me)



Some terms used in Infosec

terms infosec

terms infosec

For ReTweet, it's here → I would RT this (Thank you in advance for the visibility and support you bring me)



The main programming languages in Infosec and their main uses

programming

For ReTweet, it's here → I would RT this (Thank you in advance for the visibility and support you bring me)



What are the advantages of a VPN ?

vpn advantages

For ReTweet, it's here → I would RT this (Thank you in advance for the visibility and support you bring me)



Some good practices to avoid social engineering attack

social engineering

For ReTweet, it's here → I would RT this (Thank you in advance for the visibility and support you bring me)

I also did an article on this topic if you want to learn more, HERE



Shortcuts for Linux terminal

linux terminal shortcuts

For ReTweet, it's here → I would RT this (Thank you in advance for the visibility and support you bring me)



5 most notorious Cyber Attacks

cyber attacks

For ReTweet, it's here → I would RT this (Thank you in advance for the visibility and support you bring me)

I also did an article on this topic if you want to learn more, HERE