Crafting Your Tech Odyssey: A Journey Through Resume Building
top of page
Introduction: In the labyrinth of the tech industry, your resume is your guiding beacon, illuminating the path toward your dream job....
- Apr 7
- 2 min
Beyond Secrecy: The CIA Triad - More Than Just Classified Information
Ever heard the term "CIA Triad" and wondered if it had anything to do with the intelligence agency? Well, it does, but in a different...
20 views0 comments
- Nov 14, 2023
- 3 min
What is TCP/IP?
TCP/IP, which stands for Transmission Control Protocol/Internet Protocol, is a suite of communication protocols that form the backbone of...
20 views0 comments
- Nov 11, 2023
- 3 min
(WIP) Project Title: Securing a Small Network
Overview This project aims to demonstrate foundational cybersecurity skills by securing a small network environment. The focus will be on...
20 views0 comments
- Aug 24, 2023
- 3 min
An Introduction to the Cyber Kill Chain: Unveiling the Seven Stages of Cyber Attacks
Introduction In today's digital landscape, where businesses and individuals rely heavily on technology, the threat of cyber attacks looms...
10 views0 comments
- Jun 18, 2023
- 3 min
Mastering the Art of Encryption: Unveiling the Power of Symmetric and Asymmetric Encryption
Photo Credit: https://www.fortra.com/solutions/data-security/encryption In an increasingly digital world, the need to protect sensitive...
9 views0 comments
- May 18, 2023
- 3 min
Mastering the Cyber Kill Chain: Defending Against Advanced Threats
In today's interconnected world, where technology permeates every aspect of our lives, the importance of cybersecurity cannot be...
11 views0 comments
- May 15, 2023
- 2 min
Demystifying the OSI 7-Layer Model: Understanding the Function of Each Layer
The OSI (Open Systems Interconnection) 7-layer model is a fundamental concept in networking and plays a crucial role in understanding how...
15 views0 comments
- May 10, 2023
- 10 min
Penetration Test Detailed Report | Target:Artemis (Fictional)
Detailed Technical Report Title: Technical Vulnerability Assessment Report for Artemis Prepared By: Daniel Song Prepared For: Artemis...
95 views0 comments
- May 5, 2023
- 2 min
The Triad of Security: Safeguarding Confidentiality, Ensuring Integrity, and Providing Availability
Confidentiality, integrity, and availability, also known as the CIA triad, is a fundamental concept in information security. The CIA...
4 views0 comments
- May 3, 2023
- 2 min
Cybersecurity Essential Terminology
In today's digital age, cybersecurity is more important than ever. With the increasing frequency and severity of cyber attacks, it's...
6 views0 comments
- Apr 30, 2023
- 2 min
Operating Systems, what are they?
Before delving into the more technical aspects, let's start with the basics: What exactly is an operating system? We use technology in...
14 views0 comments
- Apr 30, 2023
- 2 min
6 Fundamental Concepts Every Beginner Should Know About Cybersecurity
As a beginner in cybersecurity, it can be overwhelming to know where to start. The cybersecurity field is constantly evolving and new...
37 views2 comments
bottom of page