Skip to content
  • July 26, 2025
The masterminds notes / motasem hamdan logo The MasterMinds Notes | Motasem Hamdan
The masterminds notes / motasem hamdan logo The MasterMinds Notes | Motasem Hamdan
  • Home
  • Study Notes
    • The Full Cybersecurity Notes Catalogue
    • Certification Notes
      • Red Team
        • OSCP
        • OSWP
        • OSWA
        • OSEP
        • COMPTIA Pentest+
        • CRTP Study Notes
        • HackTheBox CPTS
        • Certified Red Team Professional (CRTP)
        • HackTheBox CAPE
        • eJPTv2
        • Certified Ethical Hacker
        • PNPT Study Notes
      • Blue Team
        • COMPTIA Security+ SY0-701
        • Microsoft Cyber Security Analyst SC-900
        • HackTheBox CDSA
        • TryHackMe SAL1
        • Security Blue Team Level 1
        • Certified Cyber Defender (CCD)
        • COMPTIA CySA+
        • GIAC Security Essentials
        • Splunk SPLK 5001
      • Management
        • CISSP
      • IT
        • CCNA 200-301
    • Red Team Notes
      • Burp Suite Practical Study Notes
      • Metasploit Framework Study Guide & Notes in PDF
      • Buffer Overflow & Binary Exploitation Techniques | Methodology and Practical Notes
      • The Shells Study Notes
    • Blue Team Notes
      • Windows Active Directory | Security & Auditing
      • Blue Team & SOC Analyst Study Notes
      • Snort IDS Study Notes
      • Splunk SIEM Study Notes
      • Network Traffic Analysis Study Notes
      • Wazuh SIEM Study Notes
      • Wireshark Study Notes
    • Anonymity & Privacy
      • How to be anonymous and untraceable
    • Computer Forensics
      • Computer & Cyber Forensics Study Notes
      • Open Source Intelligence (OSINT) Study Notes
    • Digital Marketing & Data Analytics
      • Data Analytics Field Notes
    • Tech & IT
      • Master ChatGPT & Gemini Prompts
      • Powershell Study Guide
    • Practice Tests
      • COMPTIA Pentest+
      • COMPTIA Security+
  • Online Courses
    • Paid
      • Mastering AI for Cybersecurity Course
      • Master Cybersecurity & Ethical Hacking Courses Bundle
      • The Complete Splunk SIEM Course Online with Practical Scenarios
      • Windows Privilege Escalation Techniques Course
      • The Complete Practical Metasploit Framework Course
      • The Complete Practical Web Application Penetration Testing Course
      • The Complete Penetration Testing with Backbox Linux Course
    • Free
      • OSINT Mini Course
      • Wireshark Mini Course
      • Assembly Short Mini Course
      • Malware Analysis
      • Nmap Scanner
  • Blog
    • CyberSecurity Articles
    • CTF Writeups Walkthrough
    • Tech Articles
  • Terms of Service
  • About us
    • Contact Details
    • Digital Marketing Freelancer / Agency
  • Home
  • The MasterMinds Notes
  • Page 32

Highlight

Cybersecurity Certifications in 2025: Hands-On vs. HR-Friendly | Reviewing HackTheBox CJCA
Cybersecurity Certifications in 2025: Hands-On vs. HR-Friendly | Reviewing HackTheBox CJCA
Lockbit Ransomware Analysis with ANY.RUN
Lockbit Ransomware Analysis with ANY.RUN
Google Cyber Security or CompTIA Security+? Here’s What Recruiters Are REALLY Looking For
Google Cyber Security or CompTIA Security+? Here’s What Recruiters Are REALLY Looking For
TryHackMe PT1 vs HackTheBox CPTS vs OSCP | Review
TryHackMe PT1 vs HackTheBox CPTS vs OSCP | Review
TryHackMe PT1 Certification Review
TryHackMe PT1 Certification Review
HTB CDSA VS THM SAL1 | Review & Comparison
HTB CDSA VS THM SAL1 | Review & Comparison
Cybersecurity Roadmap 2025 | From Beginner to Advanced
Cybersecurity Roadmap 2025 | From Beginner to Advanced
HackTheBox CDSA vs BTL2: Which One You Should Pursue?
HackTheBox CDSA vs BTL2: Which One You Should Pursue?
Cybersecurity Certifications in 2025: Hands-On vs. HR-Friendly | Reviewing HackTheBox CJCA
Cybersecurity Certifications in 2025: Hands-On vs. HR-Friendly | Reviewing HackTheBox CJCA
Lockbit Ransomware Analysis with ANY.RUN
Lockbit Ransomware Analysis with ANY.RUN
Google Cyber Security or CompTIA Security+? Here’s What Recruiters Are REALLY Looking For
Google Cyber Security or CompTIA Security+? Here’s What Recruiters Are REALLY Looking For
TryHackMe PT1 vs HackTheBox CPTS vs OSCP | Review
TryHackMe PT1 vs HackTheBox CPTS vs OSCP | Review
TryHackMe PT1 Certification Review
TryHackMe PT1 Certification Review
HTB CDSA VS THM SAL1 | Review & Comparison
HTB CDSA VS THM SAL1 | Review & Comparison
Cybersecurity Roadmap 2025 | From Beginner to Advanced
Cybersecurity Roadmap 2025 | From Beginner to Advanced
HackTheBox CDSA vs BTL2: Which One You Should Pursue?
HackTheBox CDSA vs BTL2: Which One You Should Pursue?
Android Reverse Engineering Basics
CTF Writeups Walkthrough CyberSecurity Articles

Android Reverse Engineering Basics | Part 1 | React Native Applications

Android Reverse Engineering Basics
Read More
Windows Active Directory Penetration Testing Study Notes
Cyber Security Study Notes
0 Comments

Windows Active Directory Penetration Testing Study Notes

Read More
Threat Hunting Challenge with Elastic Search | TryHackMe Threat Hunting EndGame
CTF Writeups Walkthrough CyberSecurity Articles
TryHackMe Threat Hunting EndGame, TryHackMe Walkthrough 0 Comments

Threat Hunting Challenge with Elastic Search | TryHackMe Threat Hunting EndGame

Read More
Buffer Overflow Exploitation with Immunity Debugger | TryHackMe Buffer Overflow
CTF Writeups Walkthrough CyberSecurity Articles
CTF Writeups, TryHackMe Buffer Overflow, TryHackMe Walkthrough 0 Comments

Exploiting Hidden Ports Using Python & Directory Traversal | TryHackMe Airplane CTF

Read More
Microsoft Cyber Security Analyst SC-900 Study Guide & Notes
Cyber Security Study Notes
0 Comments

Microsoft Cyber Security Analyst SC-900 Study Notes

Read More
Linux Log Analysis Case Study | Detecting SSH Brute Force Attacks
CTF Writeups Walkthrough CyberSecurity Articles
Blue Team, Linux 0 Comments

Linux Log Analysis Case Study | Detecting SSH Brute Force Attacks

Read More
Buffer Overflow Exploitation with Immunity Debugger | TryHackMe Buffer Overflow
CTF Writeups Walkthrough CyberSecurity Articles
CTF Writeups, TryHackMe Buffer Overflow, TryHackMe Walkthrough 0 Comments

Buffer Overflow Exploitation with Immunity Debugger | TryHackMe Buffer Overflow

Read More
Network Forensics with Powershell | TryHackMe Windows Network Analysis
CTF Writeups Walkthrough CyberSecurity Articles
computer forensics, CTF Writeups, network forensic, TryHackMe Walkthrough, TryHackMe Windows Network Analysis 0 Comments

Network Forensics with Powershell | TryHackMe Windows Network Analysis

Read More
The Elastic Stack Study Notes
Cyber Security Study Notes
0 Comments

The Elastic Stack Study Notes

Read More
Threat Hunting with Elastic Search | TryHackMe Threat Hunting: Pivoting
CTF Writeups Walkthrough CyberSecurity Articles
CTF Writeups, elastic search, TryHackMe Threat Hunting: Pivoting, TryHackMe Walkthrough 0 Comments

Threat Hunting with Elastic Search | TryHackMe Threat Hunting: Pivoting

Read More

Posts pagination

1 … 31 32 33 … 81

Contact Details

Email Address:

consultation@motasem-notes.net

 

  • Home
  • Study Notes
  • Online Courses
  • Blog
  • Terms of Service
  • About us

NewsBlogger - Magazine & Blog WordPress Theme 2025 | Powered By SpiceThemes