Welcome to my cyber blog, where you can view the different topics posted on the website. everything here will be based on a Information technology branch learned and experienced, to the extent of being able to extensively speak on the topic (to some degree).
My Blog
Latest Blog & Articles
There’s never a time to operate without security!
What is Security Operation Center? According to ibm.com security operations center is a team of information technology security professionals that monitors and organizations…
Uncomplicating the amazing reality of a “Firewall”
Firewall? That ‘Fiery’ wall that stands between you, and everyone outside of your network. Before we can even think of configuring a firewall,…
For The Love Of INCIDENT RESPONSE!
what, why and how to, in simple terms! What is incident response and why is it important? An abstract design of a terminal…
Nessus is one the best. Love it and use it!
Welcome to my overview of Nessus vulnerability scanner. Vulnerability scanning is a subset of vulnerability management, and is the process of scanning and…
Live for the love to Perform Reconnaissance with nmap
How to footprint or perform reconnaissance? In this lab we will be using both a kali Linux and windows 10 operating system. We…
You need to learn how to Kali!
No, it is not a dance. but first lets get some basic stuff for this process! such a beautiful creature! You NEED, a…
You need to learn linux right now!
Linux Administration/ Engineering What is Linux and how does it differ from other operating systems? Discuss some of the key features of Linux….
Self-Improvement is an amazing choice; guarantee life changer!
Personal growth is a choice we should surrender to. No greater accomplishments in life than setting and completing goals, and moving on to…
Types of Physical connectors used in Information Transmission and security
Visual guide to Physical connectors
Easy Ways to fix Internet Connection Issues
Have you ever come across an frustrating issue with your internet connecting, either on a website, or your device? Use these customized steps…
Creating a Network lab!
One powerful way to get you on the road to a Network Admin! There is a lot of information to process before creating…
The OSI Model. The Outstanding Interoperability; Open System Interconnect
In simple terms, the OSI model is a routine, that runs on the backend of your internet and network components, consisting of both…
Cybersecurity Podcasts to listen to!
Cyberwire for more IT news, which is very informational! Discuss the ideas, strategies and technologies that senior cyber executives experience on a daily…
Nessus by Tenable; Vulnerability scanner.
Nessus scan your home network to locate what systems, Operating systems, IP addresses and vulnerabilities are in to your network. Please Keep your…