Crafting Your Tech Odyssey: A Journey Through Resume Building
top of page
Introduction: In the labyrinth of the tech industry, your resume is your guiding beacon, illuminating the path toward your dream job....
Apr 72 min read
Beyond Secrecy: The CIA Triad - More Than Just Classified Information
Ever heard the term "CIA Triad" and wondered if it had anything to do with the intelligence agency? Well, it does, but in a different...
20 views0 comments
Nov 14, 20233 min read
What is TCP/IP?
TCP/IP, which stands for Transmission Control Protocol/Internet Protocol, is a suite of communication protocols that form the backbone of...
20 views0 comments
Nov 11, 20233 min read
(WIP) Project Title: Securing a Small Network
Overview This project aims to demonstrate foundational cybersecurity skills by securing a small network environment. The focus will be on...
20 views0 comments
Aug 24, 20233 min read
An Introduction to the Cyber Kill Chain: Unveiling the Seven Stages of Cyber Attacks
Introduction In today's digital landscape, where businesses and individuals rely heavily on technology, the threat of cyber attacks looms...
10 views0 comments
Jun 18, 20233 min read
Mastering the Art of Encryption: Unveiling the Power of Symmetric and Asymmetric Encryption
Photo Credit: https://www.fortra.com/solutions/data-security/encryption In an increasingly digital world, the need to protect sensitive...
10 views0 comments
May 18, 20233 min read
Mastering the Cyber Kill Chain: Defending Against Advanced Threats
In today's interconnected world, where technology permeates every aspect of our lives, the importance of cybersecurity cannot be...
11 views0 comments
May 15, 20232 min read
Demystifying the OSI 7-Layer Model: Understanding the Function of Each Layer
The OSI (Open Systems Interconnection) 7-layer model is a fundamental concept in networking and plays a crucial role in understanding how...
16 views0 comments
May 10, 202310 min read
Penetration Test Detailed Report | Target:Artemis (Fictional)
Detailed Technical Report Title: Technical Vulnerability Assessment Report for Artemis Prepared By: Daniel Song Prepared For: Artemis...
101 views0 comments
May 5, 20232 min read
The Triad of Security: Safeguarding Confidentiality, Ensuring Integrity, and Providing Availability
Confidentiality, integrity, and availability, also known as the CIA triad, is a fundamental concept in information security. The CIA...
4 views0 comments
May 3, 20232 min read
Cybersecurity Essential Terminology
In today's digital age, cybersecurity is more important than ever. With the increasing frequency and severity of cyber attacks, it's...
6 views0 comments
Apr 30, 20232 min read
Operating Systems, what are they?
Before delving into the more technical aspects, let's start with the basics: What exactly is an operating system? We use technology in...
14 views0 comments
Apr 30, 20232 min read
6 Fundamental Concepts Every Beginner Should Know About Cybersecurity
As a beginner in cybersecurity, it can be overwhelming to know where to start. The cybersecurity field is constantly evolving and new...
37 views2 comments
bottom of page