Welcome to my cyber blog, where you can view the different topics posted on the website. everything here will be based on a Information technology branch learned and experienced, to the extent of being able to extensively speak on the topic (to some degree).
My Blog
Latest Blog & Articles
What in the world is a Cyber Threat Intelligence Analyst?
For a project, I watch the presentation by Katie Nickels on The Cycle of Cyber Threat Intelligence, by SANS Digital Forensics and Incident…
Compliance: Unlocking its’ amazing secrets
Several different regulations, standards and legislation are practiced by various organizations and government agencies. Almost every country has its own national and state-level…
Cybersecurity is the new mindset!
Almost everything cyber And information security! Cybersecurity is the main line of defense for the next generations to come! Who would be better…
How to appreciate the beauty of the cloud!
When i say cloud, i am not referring to the white or grey ones in the sky. Instead, i am speaking to the…
What is love without Computers?
Before you can understand how computer communicate across a network or to each other, you must first and most importantly understand how a…
There’s never a time to operate without security!
What is Security Operation Center? According to ibm.com security operations center is a team of information technology security professionals that monitors and organizations…
Uncomplicating the amazing reality of a “Firewall”
Firewall? That ‘Fiery’ wall that stands between you, and everyone outside of your network. Before we can even think of configuring a firewall,…
For The Love Of INCIDENT RESPONSE!
what, why and how to, in simple terms! What is incident response and why is it important? An abstract design of a terminal…
Nessus is one the best. Love it and use it!
Welcome to my overview of Nessus vulnerability scanner. Vulnerability scanning is a subset of vulnerability management, and is the process of scanning and…
Live for the love to Perform Reconnaissance with nmap
How to footprint or perform reconnaissance? In this lab we will be using both a kali Linux and windows 10 operating system. We…
You need to learn how to Kali!
No, it is not a dance. but first lets get some basic stuff for this process! such a beautiful creature! You NEED, a…
You need to learn linux right now!
Linux Administration/ Engineering What is Linux and how does it differ from other operating systems? Discuss some of the key features of Linux….
Self-Improvement is an amazing choice; guarantee life changer!
Personal growth is a choice we should surrender to. No greater accomplishments in life than setting and completing goals, and moving on to…
Types of Physical connectors used in Information Transmission and security
Visual guide to Physical connectors
Easy Ways to fix Internet Connection Issues
Have you ever come across an frustrating issue with your internet connecting, either on a website, or your device? Use these customized steps…
Creating a Network lab!
One powerful way to get you on the road to a Network Admin! There is a lot of information to process before creating…
The OSI Model. The Outstanding Interoperability; Open System Interconnect
In simple terms, the OSI model is a routine, that runs on the backend of your internet and network components, consisting of both…
Cybersecurity Podcasts to listen to!
Cyberwire for more IT news, which is very informational! Discuss the ideas, strategies and technologies that senior cyber executives experience on a daily…
Nessus by Tenable; Vulnerability scanner.
Nessus scan your home network to locate what systems, Operating systems, IP addresses and vulnerabilities are in to your network. Please Keep your…